Comptia Security + Exam MCQs

Comptia Security + Exam MCQs

Our team has conducted extensive research to compile a set of Comptia Security + Exam MCQs. We encourage you to test your Comptia Security + Exam knowledge by answering these 20 multiple-choice questions provided below.
Simply scroll down to begin!

1: Which protocol ensures private communications by ensuring that no third party can eavesdrop or tamper with any message or data transfer between client and server systems and is the successor to the secure Socket Layer (SSL)?

A.   Buffer overflow

B.   Diffie-Hellman

C.   TLS

D.   Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.

2: Which of the following manages peer authentication and key exchange for an IPSec connection?

A.   AC filtering - Disabled SSID broadcast

B.   Business impact analysis

C.   MAC filtering

D.   IKE

3: A security administrator is tasked with ensuring that all servers are highly available and that hard drive failure will not affect an individual server. Which of the following configurations will allow for high availability?

A.   Mandatory vacation

B.   Mantrap

C.   Hardware RAID 5 - Software RAID 1

D.   Hot and cold aisles

4: Which of the following protocols requires the use of a CA based authentication process?

A.   War driving

B.   Gas

C.   Ensure a proper chain of custody

D.   PEAP-TLS

5: Which of the following will provide the HIGHEST level of wireless network security?

A.   MD5

B.   WPA2

C.   Least privilege

D.   SYN attacks

6: The security administrator implemented privacy password protected screen savers - and hired a secure shredding and disposal service. Which of the following attacks is the security administrator trying to mitigate?

A.   EMI shielding

B.   DMZ

C.   Only the message data is encrypted

D.   Dumpster diving - Shoulder surfing

7: Which of the following describes a passive attempt to identify weaknesses?

A.   Information disclosure

B.   Before and after the imaging process and then hash the forensic image

C.   Vulnerability scan

D.   Vulnerability scanning

8: You are looking for ways to protect data on a network. Your solution should: Provide for easy backup of all user data.

A.   25

B.   Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.

C.   Implicit deny

D.   Mandatory vacations

9: What types of encryption are used for adding a digital signature to a message?

A.   Multi-factor authentication.

B.   Asymmetric and Hashing

C.   Load balancer

D.   Firewall rulesflow of network traffic at the edge of the network

10: A critical system in the datacenter is not connected to a UPS. The security administrator has coordinated an authorized service interruption to resolve this issue. This is an example of which of the following?

A.   Escalation of privileges.

B.   HSM

C.   The new access point was mis-configured and is interfering with another nearby access point.

D.   Fault tolerance

11: Upper management decides which risk to mitigate based on cost. This is an example of:

A.   Man-in-the-middle

B.   User rights and permissions reviews

C.   Install a network-based IDS

D.   Quantitative risk assessment

12: What key is used to encrypt an HTTPS session?

A.   IDS

B.   Symmetric

C.   SSL

D.   Fiber optic

13: Which of the following is true concerning email message encryption by using S/MIME?

A.   NIPS is blocking activities from those specific websites.

B.   Shoulder surfing

C.   Only the message data is encrypted

D.   A system that stops an attack in progress.

14: Which of the following is another name for a malicious attacker?

A.   WPA Enterprise

B.   Black hat

C.   Mantraps

D.   War driving

15: A security administrator wants to determine what data is allowed to be collected from users of the corporate Internet-facing web application. Which of the following should be referenced?

A.   Privacy policy

B.   Firewall rulesflow of network traffic at the edge of the network

C.   Risk transference

D.   Mandatory vacations

16: Which of the following MUST a programmer implement to prevent cross-site scripting?

A.   Security guard - Proximity reader

B.   Validate input to remove hypertext

C.   S/MIME PGP

D.   IPSec

17: Risk can be managed in the following ways...

A.   Ensure a proper chain of custody

B.   Mitigation - acceptance - transference

C.   Proxies

D.   User rights

18: Users in your network are able to assign permissions to their own shared resources. Which of the following access control models is used in your network?

A.   Integrity and Authentication

B.   DAC

C.   Se file servers attached to an NAS system.

D.   MD5

19: The 64 bit block cipher with 16 iterations giving a 56 bit key is called?

A.   Data Encryption Standard (DES)

B.   Location that meets power and connectivity requirementsdatacenter

C.   Clustering

D.   Content inspection.

20: Which of the following access control models allows classification and labeling of objects?

A.   ICMP

B.   MD5

C.   MAC

D.   MAC filtering

21: Which of the following is the BEST way to secure data for the purpose of retention?

A.   Off-site backup

B.   TCP SYN flood attack

C.   The web site's private key.

D.   War driving

22: Which of the following assists in identifying if a system was properly handled during transport?

A.   Video surveillance

B.   Firewall rulesflow of network traffic at the edge of the network

C.   A system that stops an attack in progress.

D.   Chain of custody

23: Which of the following is a best practice to identify fraud from an employee in a sensitive position?

A.   Security guard - Proximity reader

B.   Mandatory vacations

C.   Fiber optic

D.   Humidity

24: Performing routine security audits is a form of which of the following controls?

A.   Implicit deny

B.   Gas

C.   Detective

D.   Tailgating

25: You detected an intrusion and are taking the necessary steps to preserve the evidence. You want to make sure the evidence will be admissible in a court of law. What should you do?

A.   Provide an appropriate ambient temperature and Maintain appropriate humidity levels

B.   Forward to different RDP listening ports.

C.   Ensure a proper chain of custody

D.   Smurf attack

26: Which of the following is a reason to perform user awareness and training?

A.   To minimize the organizational risk posed by users

B.   Accountability

C.   Segmentation of each wireless user from other wireless users

D.   Use SSH to connect to the Linux shell

27: Which of the following is an example of allowing another user physical access to a secured area without validation of their credentials?

A.   Loop protection

B.   Tailgating

C.   Signing of a user agreement.

D.   Baseline reporting

28: Which of the following functions is MOST likely performed by a web security gateway?

A.   Vishing

B.   Content filtering

C.   A system that stops an attack in progress.

D.   Rogue access points

29: Which of the following will educate employees about malicious attempts from an attacker to obtain bank account information?

A.   Chain of custody

B.   The server is missing the default gateway.

C.   Clustering

D.   Phishing techniques