Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA Security Plus SY0 401 Test 2

This free CompTIA Security+ practice exam covers basic knowledge in the field of Information Systems Security. To pass the CompTIA Security+ exam, a candidate will need knowledge in Network Security, Compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security. This free practice test will test your knowledge and readiness for the CompTIA Security+ Examination.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following is a hardware based encryption device?

  • EFS
  • TrueCrypt
  • SLE
  • TPM

Which of the following assets is MOST likely considered for DLP?

  • Print server
  • Application server content
  • USB mass storage device
  • Reverse proxy

Geneson, an administrator, needs to make sure the wireless network is not accessible from the parking area of their office. Which of the following would BEST help Geneson when deploying a new access point?

  • Implementing WPA2
  • Placement of antenna
  • Enabling the MAC filtering
  • Disabling SSID

Sara, an application developer, has just implemented error and exception handling in an application. Which of the following does this help prevent?

  • Buffer overflow
  • Fuzzing
  • Cross-site scripting
  • Pop-up blockers

An administrator in the Network Security Department notices that an employee in the Networking Department made unauthorized changes to a firewall over the weekend. Which of the following would be used to mitigate this issue so that only security administrators can make changes to the firewall?

  • Job rotation
  • Mandatory vacations
  • Time of day restriction
  • Least privilege

Which of the following application security testing techniques is implemented when an automated system generates random input data?

  • Hardening
  • XSRF
  • Input validation
  • Fuzzing

A network administrator has recently updated their network devices to ensure redundancy is in place so that:

  • Switches can redistribute routes across the network
  • Single points of failure are removed
  • Environmental monitoring can be performed
  • Hot and cold aisles are functioning

Which of the following is BEST used as a secure replacement for TELNET?

  • GPG
  • HTTPS
  • SSH
  • HMAC

Which statement is TRUE about the operation of a packet sniffer?

  • It can only have one interface on a management network.
  • The Ethernet card must be placed in promiscuous mode.
  • It must be placed on a single virtual LAN interface.
  • They are required for firewall operation and stateful inspection.

A software development company wants to implement a digital rights management solution to protect its intellectual property. Which of the following should the company implement to enforce software digital rights?

  • Public Key infrastructure
  • Transport encryption
  • Non-repudiation
  • IPsec

A user ID and password together provide which of the following?

  • Identifcation
  • Authentication
  • Authorization
  • Auditing

An administrator is receiving an error in browser stating a website's certificate is invalid. Which of the following is the browser referring to?

  • Public key
  • CRL
  • Recovery agent
  • Private key

Using proximity card readers instead of the traditional key punch doors would help to mitigate:

  • Impersonation
  • Tailgating
  • Dumpster diving
  • Shoulder surfing

The IT department has setup a website with a series of questions to allow end users to reset their own accounts. Which of the following account management practices does this help?

  • Password Complexity
  • Password Recovery
  • Password Expirations
  • Account Disablements

An IT director is looking to reduce the footprint of their company's server environment. They have decided to move several internally developed software applications to an alternate environment, supported by an external company. They will still maintain the software, operating systems and configurations, but will not manage the physical hardware. Which of the following BEST describes this arrangement?

  • Storage as a Service
  • Platform as a Service
  • Infrastructure as a Service
  • Software as a Service

A company storing data on a secure server wants to ensure it is legally able to dismiss and prosecute staff who intentionally access the server via Telnet and illegally tamper with customer data. Which of the following administrative controls should be implemented to BEST achieve this?

  • Session output pipe to /dev/null
  • Warning banners
  • Restricted interface
  • Command shell restriction

Which of the following network architecture concepts is used to securely isolate network devices at the boundary between networks?

  • VLAN
  • Subnetting
  • DMZ
  • NAT

Sara, a security manager, has decided to force expiration of all company passwords by the close of business day. Which of the following BEST supports this reasoning?

  • Implementation of configuration management processes
  • Implementation of account lockout procedures.
  • Enforcement of password complexity requirements
  • A recent security breach in which passwords were cracked

After a user performed a war driving attack, the network administrator noticed several similar markings where WiFi was available throughout the enterprise. Which of the following is the term used to describe these markings?

  • War chalking
  • Rogue access points
  • IV attack
  • War dialing

Rachael, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to one public IP address on the external interface of the same firewall. Which of the following should Rachael configure?

  • DNS
  • NACL
  • PACL
  • NAT