CompTIA Security+ (Sy0-301) Practice Exam

50 Questions | Total Attempts: 5372

SettingsSettingsSettings
Security Plus Quizzes & Trivia

When you have a computer on which you use sensitive information like bank details and passwords, you’re probably content in the knowledge that it’s being protected so long as you have decent internet security installed. Have you ever stopped to think about what processes go into ensuring computers are kept safe from malware and hacking? Take this quiz to learn all about it! Good luck!


Questions and Answers
  • 1. 
    What feature of a network switch allows the network administrator to capture network traffic when monitoring or troubleshooting the network?
    • A. 

      Port security

    • B. 

      VLAN

    • C. 

      Collision domain

    • D. 

      Port Mirroring

  • 2. 
    Your manager has been reading about hackers capturing network traffic in a switched network environment and is wondering how it is possible that hackers can do this.  How can this be accomplished?  (Select all that apply.)
    • A. 

      ARP Poisioning

    • B. 

      Port mirroring

    • C. 

      Port security

    • D. 

      MAC flooding

    • E. 

      VLANs

  • 3. 
    Your company has a web application that seems to be running slowly.  Your manager is wondering what can be done to improve the performance.  How do you respond?
    • A. 

      Install a proxy server

    • B. 

      Install a load balancer

    • C. 

      Configure the web site in a VLAN

    • D. 

      Configure port security

  • 4. 
    Which of the following devices could be used to limit which web sites users on the network can visit?
    • A. 

      Router

    • B. 

      Load balancer

    • C. 

      Proxy server

    • D. 

      CAT 5e

  • 5. 
    Which TCP/IP protocol is used to convert the IP address to a MAC address?
    • A. 

      ARP

    • B. 

      TCP

    • C. 

      ICMP

    • D. 

      UDP

  • 6. 
    What ICMP type is used to identify echo request messages?
    • A. 

      0

    • B. 

      4

    • C. 

      8

    • D. 

      9

  • 7. 
    Which of the following identifies the stages of the three-way handshake?
    • A. 

      ACK/SYN, ACK, SYN

    • B. 

      SYN, ACK/SYN, ACK

    • C. 

      ACK, SYN, ACK/SYN

    • D. 

      SYN, ACK, ACK/SYN

  • 8. 
    Which of the following represents ports used by secure TCP applications? (Select all that apply.)
    • A. 

      23

    • B. 

      22

    • C. 

      80

    • D. 

      143

    • E. 

      443

  • 9. 
    You are the network administrator for a small company, and you wish to follow security best practices that relate to the switch.  Which of the following should you do? (Select all that apply.)
    • A. 

      Disable unused ports

    • B. 

      Enable all unused ports

    • C. 

      Configure port security

    • D. 

      Disable port security

    • E. 

      Enable console password

    • F. 

      Disable console password

  • 10. 
    What popular feature of a switch allows you to create communication boundaries between systems connected to the switch?
    • A. 

      ARP poisoning

    • B. 

      Port mirroring

    • C. 

      Port security

    • D. 

      MAC flooding

    • E. 

      VLANs

  • 11. 
    As requested by your manager you purchase two servers to participate in a server cluster so that if one server fails, the other server will take over the workload.  Which of the following goals of security has been met?
    • A. 

      Confidentiality

    • B. 

      Accountability

    • C. 

      Integrity

    • D. 

      Availability

  • 12. 
    You have protected the contents of a highly sensitive file by encrypting the data using Windows EFS. Which of the following goals of security has been satisfied?
    • A. 

      Confidentiality

    • B. 

      Accountability

    • C. 

      Integrity

    • D. 

      Availability

  • 13. 
    You have managed the file permissions on a file so that unauthorized persons cannot make modifications to the file. What goal of security has been met?
    • A. 

      Confidentiality

    • B. 

      Accountability

    • C. 

      Integrity

    • D. 

      Availability

  • 14. 
    You have configured your network so that each person on the network must provide a username and password to gain access. Presenting a username is an example of what?
    • A. 

      Authentication

    • B. 

      Identification

    • C. 

      Authorization

    • D. 

      Confidentiality

  • 15. 
    You have configured the permissions on the accounting folder so that the Accounting group can create, modify, and delete content in the folder; the Managers group can read the contents of the folder; and all other users have been denied access. This is an example of which of the following?
    • A. 

      Authentication

    • B. 

      Identification

    • C. 

      Authorization

    • D. 

      Confidentiality

  • 16. 
    Which of the following are considered biometrics? (Select all that apply)
    • A. 

      Username and password

    • B. 

      Smartcard

    • C. 

      PIN number

    • D. 

      Fingerprint

    • E. 

      Retina scan

  • 17. 
    Before an individual is authorized to access resources on the network, they are first ________ with the network.
    • A. 

      Authenticated

    • B. 

      Identified

    • C. 

      Authorized

    • D. 

      Encrypted

  • 18. 
    You have taken the time to create and implement security policies within your organization.  This is an example of which of the following?
    • A. 

      Due diligence

    • B. 

      Separation of duties

    • C. 

      Least privilege

    • D. 

      Due care

  • 19. 
    All accountants need to be able to modify the accounting data except for Bob. Due to Bob’s job requirements, you have ensured that Bob receives only the read permission to the accounting data. This is an example of which of the following?
    • A. 

      Rotation of duties

    • B. 

      Separation of duties

    • C. 

      Least privilege

    • D. 

      Due care

  • 20. 
    Which of the following represents the reasoning for implementing rotation of duties in your environment?
    • A. 

      To limit fraudulent activities within the organization

    • B. 

      To keep data private to the appropriate individuals

    • C. 

      To make information available

    • D. 

      To ensure the secrecy of the information

  • 21. 
    Within most organizations the person who writes the check is not the person who signs the check. This is an example of which of the following?
    • A. 

      Rotation of duties

    • B. 

      Separation of duties

    • C. 

      Least privilege

    • D. 

      Due care

  • 22. 
    After creating and implementing the company security policy, you verify that policies are being followed on a regular basis by performing regular audits. This is an example of which of the following?
    • A. 

      Due diligence

    • B. 

      Separation of duties

    • C. 

      Least privilege

    • D. 

      Due care

  • 23. 
    What type of hacker learns hacking techniques so that they can better defend against a malicious hacker?
    • A. 

      Black-hat

    • B. 

      Gray-hat

    • C. 

      White-hat

    • D. 

      Yellow-hat

  • 24. 
    The entity that is responsible for deciding the level of protection that is placed on data and that is ultimately responsible for the security of that data is which of the following?
    • A. 

      Custodian

    • B. 

      Owner

    • C. 

      User

    • D. 

      Administrator

  • 25. 
    The entity that is responsible for implementing the appropriate security controls to protect an asset is which of the following?
    • A. 

      Custodian

    • B. 

      Owner

    • C. 

      User

    • D. 

      Administrator