IT CertificationsComprehensive Study Set

What Is The Best Comptia Security+ Study Guide

96 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

A security administrator is implementing a security program that addresses confidentiality and availability. What else should the administrator include?

ANSWER

Ensure systems are not susceptible to unauthorized changes

QUESTION 2

You need to transmit PII via email and you want to maintain its confidentiality. What is the BEST solution?

ANSWER

Encrypt it before sending

QUESTION 3

Lisa manages network devices in your organization and maintains copies of the configuration filed for all the managed routers and switches. On a weekly basis, she creates hashes for these files and compares them with hashes she created on the same files the previous week. Which security goal is she pursuing?

ANSWER

Integrity

QUESTION 4

An organization wants to provide protection against malware attacks. Administrators have installed antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the network. Which of the following BEST identifies this principal?

ANSWER

Layered security

QUESTION 5

Homer called into the help desk and says he forgot his password. Which of the following choices is the BEST choice for what the help-desk professional should do?

ANSWER

Reset the password and configure the password to expire after the first use.

QUESTION 6

Which type of authentication does a hardware token provide?

ANSWER

One-time password

QUESTION 7

Which type of authentication is a retina scan?

ANSWER

Biometric

QUESTION 8

Users are required to log on to their computers with a smart card and a PIN. Which BEST describes this?

ANSWER

Multifactor authentication

QUESTION 9

Your company recently began allowing workers to telecommute from home one or more days a week. However, your company doesn't currently have a remote access solution. They want to implement an AAA solution that supports different vendors. Which is the BEST choice?

ANSWER

RADIUS

QUESTION 10

Your organization has implemented a system that stores user credentials in a central database. Users log on once with their credentials. They can then access other systems in the organization without logging on again. What does this describe?

ANSWER

Single sign-on

QUESTION 11

Your organization issues users a variety of different mobile devices. However, management want to reduce potential data losses if the devices are lost or stolen. Which is the BEST technical control to achieve this goal?

ANSWER

Disk encryption

QUESTION 12

An outside security auditor recently completed an in-depth security audit on your network. One of the issues he reported was related to passwords. Specifically, he found the following passwords used on the network: Pa$$, 1@W2, and G7bT3. What should be change to avoid the problem shown with these passwords?

ANSWER

Mantrap

QUESTION 13

A recent security audit discovered several apparently dormant user accounts. Although users could log on to the accounts, no one had logged on to them for more than 60 days. You later discovered that these accounts are for contractors who work approximately one week every quarter. What is the BEST response to this situation?

ANSWER

Password length

QUESTION 14

Your organization routinely hires contractors to assist with different projects. Administrators are rarely notified when a project ends and contractors leave. Which is the BEST choice to ensure that contractors cannot log on with their account after they leave?

ANSWER

Disable the accounts

QUESTION 15

Developers are planning to develop an application using role-based access control. Which would they MOST likely include in their planning?

ANSWER

Enable account expiration

QUESTION 16

An organization has implemented an access control model that enforces permissions based on data labels assigned at different levels. What type of model is this?

ANSWER

A matrix of functions matched with their required priviliges

QUESTION 17

Which protocols use TCP port 22 by default?

ANSWER

MAC

QUESTION 18

Bart wants to block access to all external web sites. Which port should he block at the firewall?

ANSWER

SSH, SCP, SFTP

QUESTION 19

You need to manage a remote server. Which ports should you open on the firewall between your system and the remote server?

ANSWER

TCP 80

QUESTION 20

While reviewing logs on a firewall, you see several requests for the AAAA record of gcgapremium.com. What is the purpose of this request?

ANSWER

22 an 3389

QUESTION 21

Your organization has several switches used within the network. You need to implement a security control to secure the switch from physical access. What should you do?

ANSWER

To identify the IPv6 address of gcgapremium.com

QUESTION 22

You are configuring a switch and need to ensure that only authorized devices can connect to it and access the network through this switch. Which is the BEST choice to meet this goal?

ANSWER

Disable unused ports

QUESTION 23

You need to configure a UTM security appliance to restrict access to peer-to-peer file sharing web sites. What are you MOST likely to configure?

ANSWER

Implement 802.1x

QUESTION 24

Your organization has implemented a network design that allows internal computers to share one public IP address. What did they MOST likely implement?

ANSWER

URL Filter

QUESTION 25

What would you configure on a Layer 3 device to allow FTP traffic to pass through?

ANSWER

PAT

QUESTION 26

What type of device would have the following entries used to define its operation? permit IP any any eq 80 permit IP any any eq 443 deny IP any any

ANSWER

Access control list

QUESTION 27

You are preparing to deploy an anomaly-based detection system to monitor networks activity. What would you create first?

ANSWER

Firewall

QUESTION 28

A security company wants to gather intelligence about current methods attackers are using against its clients. What can it use?

ANSWER

Baseline

QUESTION 29

Lisa oversees and monitors processes at a water treatment plant using SCADA systems. Administrators recently discovered malware on her system that was connecting to the SCASA system. Although they removed the malware, management is still concerned. Lisa needs to continue using her system and it's not possible to update the SCADA system. What can mitigate the risk?

ANSWER

Honeynet

QUESTION 30

Your organization maintains a separate wireless network for visitors in a conference room. However, you have recently noticed that people are connecting to this network even when there aren't any visitors in the conference room. You want to prevent these connections, while maintaining easy access for visitors in the conference room. Which is the BEST solution?

ANSWER

Install a NIPS on the border of the SCADA network

QUESTION 31

Which represents the BEST action to increase security in a wireless network?

ANSWER

Reduce antenna power

QUESTION 32

Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the wired network is operational. What is the MOST likely cause for the problem?

ANSWER

Replace TKIP with CCMP

QUESTION 33

You are planning a wireless network for a business. A core requirement is to ensure that the solution encrypts user credentials when users enter their usernames and passwords. What BEST meets this requirement?

ANSWER

The RADIUS server certificate expired.

QUESTION 34

A small business owner modified his wireless router with the following settings: PERMIT 1A:2B:3C:4D:5E:6F DENY 6F:5E:4D:3C:2B:1A After saving the settings, an employee reports that he cannot access the wireless network anymore. What is the MOST likely reason that the employee cannot access the network?

ANSWER

WPA2 over EAP-TTLS

QUESTION 35

Homer recently implemented a wireless network in his home using WEP. He asks you for advice. What is the BEST advice you can give him?

ANSWER

Hardware address filtering

QUESTION 36

What is an attack against a mobile device?

ANSWER

He should not use WEP because it implements weak IVs for encryption keys.

QUESTION 37

A network administrator needs to open a port on a firewall to support a VPN using PPTP. Which port should the administrator open?

ANSWER

Bluejacking

QUESTION 38

Attackers recently attacked a web server hosted by your organization. Management has tasked administrators with reducing the attack surface of this server to prevent future attacks. What will meet this goal?

ANSWER

TCP 1723

QUESTION 39

Network administrators identified what appears to be malicious traffic coming from an internal computer, but only when no one is logged on to the computer. You suspect the system is infected with malware. It periodically runs an application that attempts to connect to web sites over port 80 with Telnet. After comparing the computer with a list of services from the standard image, you verify this application is very likely the problem. What process allowed you to make this determination?

ANSWER

Identifying the baseline

QUESTION 40

An updated security policy defines what applications users can install and run on company-issued mobile devices. What technical controls will enforce this policy?

ANSWER

Baselining

QUESTION 41

You want to test new security controls before deploying them. What technologies provide the MOST flexibility to meet this goal?

ANSWER

Whitelisting

QUESTION 42

An organization recently suffered a significant outage after a technical installed an application update on a viral server during peak hours. The server remained down until administrators were able to install a previous version of the application on the server. What could the organization implement to prevent a reoccurrence of this problem?

ANSWER

Virtualization technologies

QUESTION 43

A security analyst is evaluation a critical industrial control system. The analyst wants to ensure the system has security controls to support availability. What will be BEST to meet this need?

ANSWER

Create a patch management policy

QUESTION 44

What are valid security controls for mobile devices?

ANSWER

Implementing control redundancy and diversity

QUESTION 45

A new mobile device security policy has authorized the use of employee-owned devices, but mandates additional security controls to protect them if devices are lost or stolen. What meets this goal?

ANSWER

Screen locks, device encryption, and remote wipe

QUESTION 46

You want to deter an attacker from using brute force to gain access to a mobile device. What would you configure?

ANSWER

Screen locks, and device encryption

QUESTION 47

Management within your company is considering allowing users to connect to the corporate network with their personally owned devices. What represents a security concern with this policy?

ANSWER

Account lockout settings

QUESTION 48

Your organization is planning to issue mobile devices to some employees, but management is concerned about protecting the confidentiality of data if the devices are lost or stolen. What is the BEST way to secure data at rest a mobile device?

ANSWER

Inability to ensure devices are up to date with current system patches

QUESTION 49

Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?

ANSWER

Full device encryption

QUESTION 50

Management within your organization wants to limit documents copied to USB flash drives. What can be used to meet this goal?

ANSWER

TPM

QUESTION 51

Bart installed code designed to enable his account automatically, three days after anyone disables it. What does this describe?

ANSWER

DLP

QUESTION 52

Lisa recently completed an application used by the Personnel department to store PII and other employee information. She programmed in the ability to access this application with a username and password that only she knows, so that she can perform remote maintenance on the application if necessary. What does this describe?

ANSWER

Logic bomb

QUESTION 53

A recent change in an organization's security policy states that monitors need to be positioned so that the canoe be viewed from outside any windows. What is the purpose of this policy?

ANSWER

Backdoor

QUESTION 54

You are troubleshooting an intermittent connectivity issue with a web server. After examining the logs, You identify repeated connection attempts from various IP addresses. You realize these connection attempts are overloading the server, preventing it from responding to other connections. What is MOST likely occurring?

ANSWER

Reduce success of shoulder surfing

QUESTION 55

Your organization includes the following statement in the security policy: "Security controls need to protect against both online and offline password brute force attacks." Which controls are the LEAST helpful to meet these goals?

ANSWER

DDoS attack

QUESTION 56

A code review of a web application discovered that the application is not performing boundary checking. What should the web developer add to this application to resolve this issue?

ANSWER

Account expiration

QUESTION 57

A web developer is using methods to validate user input in a web site application. This insures the application isn't vulnerable to all of the following attack except one. What attacks are NOT prevented by validation user input?

ANSWER

Input validation

QUESTION 58

Checking the logs of a web server, you see the following entry: 198.252.69.129--[1/Sep/2013:05:20]"GET/index.php?username=ZZZZZZZZZZZZZZZZZZZZZZBBBBBBBBCCCCCCCHTTP/1.1""http://gcgapremium.com/security/""Chrome31" What is the BEST explanation to this entry?

ANSWER

Whaling

QUESTION 59

Looking at logs for an online web application, you see that someone has entered the following phrase into several queries: 'or'1'='1'-- What is the MOST likely explanation for this?

ANSWER

A buffer overflow attack

QUESTION 60

A security tester is using fuzzing techniques to test a software application. Which of the following does fuzzing use to test the application?

ANSWER

A SQL injection attack

QUESTION 61

An organization has purchased fire insurance to manage the risk of a potential fire. What methods are they using?

ANSWER

Unexpected input

QUESTION 62

You are asked to identify the number of times a specific type of incident occurs per year. Which of the following BEST identifies this?

ANSWER

Risk Transference

QUESTION 63

Lisa needs to calculate the total ALE for a group of servers used in the network. During the past two years, five of the servers failed. The hardware cost to replace each server is $3,500, and the downtime has resulted in $2,500 of additional loses. What is the ALE?

ANSWER

ARO

QUESTION 64

Security experts at your organization have determined that your network has been repeatedly attacked from multiple entities in a foreign country. Research indicated these are coordinated and sophisticated attacks. What BEST describes this activity?

ANSWER

$15,000

QUESTION 65

Bart is performing a vulnerability assessment. What BEST represents the goal of this task?

ANSWER

Advance persistent threat

QUESTION 66

You need to ensure that several systems have all appropriate security controls and patches. However, your supervisor specifically told you not to attack or compromise any of these systems. What is the BEST choice to meet these goals?

ANSWER

Identify the system's security posture

QUESTION 67

Which of the following tools is the MOST invasive type of testing?

ANSWER

Vulnerability scan

QUESTION 68

A security professional is testing the functionality of an application, but does not have any knowledge about the internal coding of the application. What type of test is this tester performing?

ANSWER

Pentest

QUESTION 69

Testers are analyzing a web application your organization is planning to deploy. They have full access to product documentation, including the code and date structures used by the application. What type of test will they MOST likely perform?

ANSWER

Black box

QUESTION 70

A network administrator is attempting to identify all traffic on an internal network. Which of the following tools is the BEST choice?

ANSWER

White box

QUESTION 71

Your organization's security policy requires that personnel notify security administrators if an incident occurs. However, this is not occurring consistently. What could the organization implement to ensure security administrators are notified in a timely manner?

ANSWER

Protocol analyzer

QUESTION 72

A security administrator is reviewing an organization's security policy and notices that the policy does not define a time frame for reviewing user rights and permissions. What is the MINIMUM time frame that she should recommend?

ANSWER

Routine auditing

QUESTION 73

Security personnel recently performed a security audit. They identified several employees who had permissions for previously held jobs within the Company. What should the organization implement to prevent this in the future?

ANSWER

At lease one year.

QUESTION 74

You are a technician at a small organization. You need to add fault-tolerance capabilities within the business to increase the availability of data. However, you need to keep costs as low as possible. What is the BEST choice to meet these needs?

ANSWER

Account management controls

QUESTION 75

An organization needs to identify a continuity of operations plan that will allow it to provide temporary IT support during a disaster. The organization does not want to have a dedicated site. What provides the best solution?

ANSWER

RAID-6

QUESTION 76

Monty Burns is the CEO of the Springfield Nuclear Power Plant. What would the company have in place in case something happens to him?

ANSWER

Mobile site

QUESTION 77

A continuity of operations plan for an organization includes the use of warm site. The BCP coordinator wants to verify that the organization's backup data center is prepared to implement the warm site if necessary. What is the BEST choice to meet this need?

ANSWER

Succession Planning

QUESTION 78

Users are complaining of intermittent connectivity issues. When you investigate, you discover that new network cables for these user systems were run across several fluorescent lights. What environmental control will resolve this issue?

ANSWER

Perform a disaster recovery exercise

QUESTION 79

A software company occasionally provides application updates and patches via its web site. It also provides a checksum for each update and patch. What BEST describes the purpose of the checksum?

ANSWER

EMI Shielding

QUESTION 80

A function converts data into a string of characters and the string of characters cannot be revers to re-create the original data. What type of function is this?

ANSWER

Integrity of updates and patches

QUESTION 81

Which of the following is a symmetric encryption algorithm that encrypts data one bit at a time?

ANSWER

Hashing

QUESTION 82

A supply company has several legacy systems connected together within a warehouse. And external security audit discovered the company is using DES and mandated the company upgrade DES to meet the minimum security requirements. The company plans to replace the legacy systems next year, but needs to meet the requirements from the audit. What is MOST likely to be the simplest upgrade for these systems?

ANSWER

Stream cipher

QUESTION 83

Network administrators in your organization need to administer firewalls, security appliances, and other network devices. These devices are protected with strong passwords, and passwords are stored in a file listing these passwords. What is the BEST choice to protect this password list?

ANSWER

3DES

QUESTION 84

Bart, an employee at your organization, is suspected of leaking data to a competitor. Investigations indicate he sent several email messages containing pictures of his dog. Investigators have not been able to identify and other suspicious activity. What is MOST likely occurring?

ANSWER

File encryption

QUESTION 85

You are planning to encrypt data in transit with IPsec. What is MOST likely to be used with IPsec?

ANSWER

Bart is leaking data using steganography

QUESTION 86

Bart wants to send a secure email to Lisa, so he decides to encrypt it. He wants to ensure that only Lisa can decrypt it. What does Lisa need to meet this requirement?

ANSWER

HMAC

QUESTION 87

An organization requests bids for a contact and asks companies to submit their bids via email. After winning the bid, Acme realized it couldn't meet the requirements of the contract. Acme instead stated that it never submitted the bid. What would provide proof to the organization that Acme did submit the bid?

ANSWER

Lisa's private key

QUESTION 88

Application developers are creating an application that requires users to log on with a strong passwords. The developers want to store the passwords in such a way that it will thwart brute force attacks. What is the BEST solution?

ANSWER

Digital signatures

QUESTION 89

A web site is using a certificate. Users have recently been receiving errors from the web site indicating that the web site's certificate is revoked. What includes a list of certificates that have been revoked?

ANSWER

PBKDF2

QUESTION 90

Which of the following is a management control?

ANSWER

OCSP

QUESTION 91

Security personnel recently identified potential fraud committed by a network administrator. Investigators discovered this administrator performs several job functions within the organization, including database administration and application development. What is the BEST solution to reduce risk associated with this activity?

ANSWER

Security policy

QUESTION 92

Security experts want to reduce risks associated with updating critical operating systems. What will BEST meet this goal?

ANSWER

Separation of Duties

QUESTION 93

Your company is considering implementing SSO capabilities to company applications and linking them to a social media site. When implemented, users can log on to Facebook and then access company applications without logging on again. What is a potential risk related to this plan?

ANSWER

Change management

QUESTION 94

You work as a help-desk professional in a large organization. You have begun to receive an extraordinary number of calls from employees related to malware. Using common incident response procedures, what should be your FIRST response?

ANSWER

A data breach exposing passwords on the social media site will affect the company application

QUESTION 95

A technician confiscated an employee's computer after management learned the employee had unauthorized material on his system. Later, a security expert captured a forensic image of the system disk. However, the security expert reported the computer was left unattended for several hours before he captured the image. What is a potential issue if this incident goes to court?

ANSWER

Identification

QUESTION 96

Social engineers have launched several successful phone-based attacks against your organization resulting in several data leaks. What would be the MOST effective at reducing the success of these attacks?

ANSWER

Chain of custody

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials