This free CompTIA Security+ practice exam covers basic knowledge in the field of Information Systems Security. To pass the CompTIA Security+ exam, a candidate will need knowledge in Network Security, Compliance and operational security, threats and vulnerabilities, access control and identity management, cryptography, and application, data, and host security. This free practice test will test your knowledge and readiness for the CompTIA Security+ Examination.
1) What device will work best for servers that need to store private keys?
2) You're the admin of a large corporation's production computer system, with many users. How often should you review and audit your users rights?
3) Which of the following ACL rules will deny DHCP traffic?
4) A software test that does not examine the software's code is known as what?
5) Your supervisor asked you to open the necessary ports for a 'secure telnet' What ports should you open?
6) Which of the following options describes a zero-day attack?
7) As a security administrator, you decide to force expiration of all user passwords. Which of the following best supports this reasoning?
8) Your organization has a web server that must be accessible by external users. Which of the following options is the best location for the server?
9) A malicious program that disguises itself as a legitimate program is known as a?
10) Which of the following is the default port and protocol for HTTPS?
11) After a power outage, which of the following documents contains detailed information on the order in which the system should be restored?
12) The CEO of the company you work for has been receiving emails that appear to be from the local IT department. The emails address her user account, and instruct her to click a link in order to verify her password. Which type of attack is this?
13) You are a network administrator for a large business. Recently, you've noticed a large amount of unusual traffic and you suspect they are SYN attacks. What choice will help you defend against these attacks?
14) Select the answer that properly describes IPSec in tunnel mode:
15) What sort of attack uses information gained from social media to obtain access to a users login?
16) Which of the following is an example of a physical security measure?
17) Which answer properly describes the purpose of the CA role in Public Key Infrastructure?
18) Your supervisor asks you to implement a new KDC. Which of the following protocols is your supervisor planning to implement?
19) Which of the following options correctly describes SSO?
20) What will best help you if you need to prevent cross-site scripting on your companies intranet webpage?
You can go back and review your answers or grade your test.