Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits

CompTIA security plus SY0 401 test 5

This free CompTIA Security+ practice exam covers basic knowledge in the field of Information Systems Security. To pass the CompTIA Security+ exam, a candidate will need knowledge in Network Security, Compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security. This free practice test will test your knowledge and readiness for the CompTIA Security+ Examination.

  • Questions: 20
  • Time: 60 seconds per question (0 hours, 20 minutes, 0 seconds)

Which of the following options correctly describes SSO?

  • A protocol that safely encrypts plain text protocols
  • Allows a user to sign in to a subsystem, which grants access to multiple systems without logging in again
  • Requires a user to login to every system separately
  • Will protect credit card information while surfing the web

As a security administrator, you decide to force expiration of all user passwords. Which of the following best supports this reasoning?

  • Ensures everyone meets password complexity requirements
  • Recently several passwords were cracked
  • Regular security measure to ensure a secure network
  • Identify which users are actively logging into the network

What device will work best for servers that need to store private keys?

  • SSD hard drive
  • Hardware Security Module
  • Network firewall
  • host firewall

A software test that does not examine the software's code is known as what?

  • White Box
  • White Hat
  • Black Box
  • Grey Box

You're the admin of a large corporation's production computer system, with many users. How often should you review and audit your users rights?

  • 5 years
  • Weekly
  • Annually
  • After an employee is terminiated

After a power outage, which of the following documents contains detailed information on the order in which the system should be restored?

  • Disaster recovery Plan
  • Succession planning
  • Relief Planning
  • Information Security Plan

Which of the following is an example of a physical security measure?

  • HIDS
  • NIPS
  • Mantrap
  • Honeypot

Which answer properly describes the purpose of the CA role in Public Key Infrastructure?

  • To issue a certificate
  • To sign key escrow lists to CRLs
  • To issue and signs all root certs
  • To verify keys for authenticity

Your organization has a web server that must be accessible by external users. Which of the following options is the best location for the server?

  • Inside of a VLAN
  • Inside of a VPN
  • Behind the internal firewall
  • Inside of a DMZ

Which of the following options describes a zero-day attack?

  • An attack that exploits an new or unknown vulnerability
  • A commonly known attack, which is still unpatched
  • A type of social attack, in which the attacker targets high level executives.
  • A known attack, which has been patched and is no longer a threat

The CEO of the company you work for has been receiving emails that appear to be from the local IT department. The emails address her user account, and instruct her to click a link in order to verify her password. Which type of attack is this?

  • Whaling
  • Bluesnarfing
  • Vishing
  • Phishing

Your supervisor asked you to open the necessary ports for a 'secure telnet' What ports should you open?

  • UDP 23
  • TCP 69
  • TCP 22
  • TCP 21

Your supervisor asks you to implement a new KDC. Which of the following protocols is your supervisor planning to implement?

  • TACACS
  • Radius
  • LDAP
  • Kerberos

What will best help you if you need to prevent cross-site scripting on your companies intranet webpage?

  • SSL/HTTPS
  • NIDS
  • Anomaly HIDS
  • Input Validation

A malicious program that disguises itself as a legitimate program is known as a?

  • Spyware
  • Virus
  • Injection
  • Trojan Horse

What sort of attack uses information gained from social media to obtain access to a users login?

  • Cognitive Password Attack
  • MD5 Hash Attack
  • Birthday Attack
  • Brute Force Attack

Which of the following is the default port and protocol for HTTPS?

  • TCP 25
  • TCP 443
  • UDP 25
  • TCP 80
  • UDP 443

You are a network administrator for a large business. Recently, you've noticed a large amount of unusual traffic and you suspect they are SYN attacks. What choice will help you defend against these attacks?

  • Spanning Tree Protocol
  • VLAN
  • Flood guards
  • Implicit Deny

Select the answer that properly describes IPSec in tunnel mode:

  • Packet contents are encrypted, headers are not
  • IPSec encrypts packets using SSL, similar to SSH
  • IPSec is incompatible with OSPF WAN encryptions
  • Entire packet is encrypted and wrapped with new IP headers

Which of the following ACL rules will deny DHCP traffic?

  • ALLOW ALL BUT TCP 67
  • DENY ANY SERVER LOG
  • DENY TCP ANY SERVER LOG
  • DENY UDP ANY SERVER EQ 67