CompTIA Security
CompTIA Security
QUESTION NO: 1
A password history value of three means which of the following?
A. Three different passwords are used before one can be reused.
B. A password cannot be reused once changed for three years.
C. After three hours a password must be re-entered to continue.
D. The server stores passwords in the database for three days.
Answer: A
QUESTION NO: 2
In order to provide flexible working conditions, a company has decided to allow some employees
remote access into corporate headquarters. Which of the following security technologies could be
used to provide remote access? (Select TWO).
A. Subnetting
B. NAT
C. Firewall
D. NAC
E. VPN
Answer: C,E
QUESTION NO: 3
Which of the following is the BEST approach to perform risk mitigation of user access control rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Answer: B
QUESTION NO: 4
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall
Answer: A
QUESTION NO: 5
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
Answer: B
QUESTION NO: 6
Which of the following can prevent an unauthorized person from accessing the network by
plugging into an open network jack?
A. 802.1x
B. DHCP
C. 802.1q
D. NIPS
Answer: A
QUESTION NO: 7
A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as
which of the following?
A. Whaling
B. Bluesnarfing
C. Vishing
D. Dumpster diving
Answer: A
QUESTION NO: 8
After verifying that the server and database are running, Jane, the administrator, is still unable to
make a TCP connection to the database. Which of the following is the MOST likely cause for this?
A. The server has data execution prevention enabled
B. The server has TPM based protection enabled
C. The server has HIDS installed
D. The server is running a host-based firewall
Answer: D
QUESTION NO: 9
In regards to secure coding practices, why is input validation important?
A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline.
D. It meets gray box testing standards.
Answer: A
QUESTION NO: 10
Which of the following is a best practice before deploying a new desktop operating system image?
A. Install network monitoring software
B. Perform white box testing
C. Remove single points of failure
D. Verify operating system security settings
Answer: D
QUESTION NO: 11
Which of the following steps should follow the deployment of a patch?
A. Antivirus and anti-malware deployment
B. Audit and verification
C. Fuzzing and exploitation
D. Error and exception handling
Answer: B
QUESTION NO: 12
Which of the following would be used when a higher level of security is desired for encryption key
storage?
A. TACACS+
B. L2TP
C. LDAP
D. TPM
Answer: D
QUESTION NO: 13
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
A. Firewall
B. Application
C. IDS
D. Security
Answer: D
QUESTION NO: 14
If Pete, a security administrator, wants to ensure that certain users can only gain access to the
system during their respective shifts, which of the following best practices would he implement?
A. Separation of duties
B. Time of day restrictions
C. Implicit deny rule
D. Least privilege
Answer: B
QUESTION NO: 15
Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized access?
A. Registration
B. CA
C. CRL
D. Recovery agent
Answer: C
QUESTION NO: 16
A small business owner has asked the security consultant to suggest an inexpensive means to
deter physical intrusions at their place of business. Which of the following would BEST meet their
request?
A. Fake cameras
B. Proximity readers
C. Infrared cameras
D. Security guards
Answer: A
QUESTION NO: 17
Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this
access control type?
A. Smartcard
B. Token
C. Discretionary access control
D. Mandatory access control
Answer: A
QUESTION NO: 18
Which of the following devices would MOST likely have a DMZ interface?
A. Firewall
B. Switch
C. Load balancer
D. Proxy
Answer: A
QUESTION NO: 19
A security administrator is observing congestion on the firewall interfaces and a high number of
half open incoming connections from different external IP addresses. Which of the following attack
types is underway?
A. Cross-site scripting
B. SPIM
C. Client-side
D. DDoS
Answer: D
QUESTION NO: 20
Which of the following tools would Matt, a security administrator, MOST likely use to analyze a
malicious payload?
A. Vulnerability scanner
B. Fuzzer
C. Port scanner
D. Protocol analyzer
Answer: D
QUESTION NO: 21
Which of the following application security testing techniques is implemented when an automated
system generates random input data?
A. Fuzzing
B. XSRF
C. Hardening
D. Input validation
Answer: A
QUESTION NO: 22
Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected file?
A. Cognitive password
B. Password sniffing
C. Brute force
D. Social engineering
Answer: C
QUESTION NO: 23
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
A. Password history
B. Password logging
C. Password cracker
D. Password hashing
Answer: C
QUESTION NO: 24
Certificates are used for: (Select TWO).
A. client authentication.
B. WEP encryption.
C. access control lists.
D. code signing.
E. password hashing.
Answer: A,D
QUESTION NO: 25
Which of the following is a hardware based encryption device?
A. EFS
B. TrueCrypt
C. TPM
D. SLE
Answer: C
QUESTION NO: 26
Which of the following BEST describes a protective countermeasure for SQL injection?
A. Eliminating cross-site scripting vulnerabilities
B. Installing an IDS to monitor network traffic
C. Validating user input in web applications
D. Placing a firewall between the Internet and database servers
Answer: C
QUESTION NO: 27
Which of the following BEST describes a common security concern for cloud computing?
A. Data may be accessed by third parties who have compromised the cloud platform
B. Antivirus signatures are not compatible with virtualized environments
C. Network connections are too slow
D. CPU and memory resources may be consumed by other servers in the same cloud
Answer: A
QUESTION NO: 28
Which of the following MOST interferes with network-based detection techniques?
A. Mime-encoding
B. SSL
C. FTP
D. Anonymous email accounts
Answer: B
QUESTION NO: 29
A certificate authority takes which of the following actions in PKI?
A. Signs and verifies all infrastructure messages
B. Issues and signs all private keys
C. Publishes key escrow lists to CRLs
D. Issues and signs all root certificates
Answer: D
QUESTION NO: 30
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
Answer: A
QUESTION NO: 31
Separation of duties is often implemented between developers and administrators in order to
separate which of the following?
A. More experienced employees from less experienced employees
B. Changes to program code and the ability to deploy to production
C. Upper level management users from standard development employees
D. The network access layer from the application access layer
Answer: B
QUESTION NO: 32
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performed?
A. The request needs to be sent to the incident management team.
B. The request needs to be approved through the incident management process.
C. The request needs to be approved through the change management process.
D. The request needs to be sent to the change management team.
Answer: C
QUESTION NO: 33
Jane, an individual, has recently been calling various financial offices pretending to be another
person to gain financial information. Which of the following attacks is being described?
A. Phishing
B. Tailgating
C. Pharming
D. Vishing
Answer: D
QUESTION NO: 34
The security administrator wants each user to individually decrypt a message but allow anybody to
encrypt it. Which of the following MUST be implemented to allow this type of authorization?
A. Use of CA certificate
B. Use of public keys only
C. Use of private keys only
D. Use of public and private keys
Answer: D
QUESTION NO: 35
A user in the company is in charge of various financial roles but needs to prepare for an upcoming
audit. They use the same account to access each financial system. Which of the following security
controls will MOST likely be implemented within the company?
A. Account lockout policy
B. Account password enforcement
C. Password complexity enabled
D. Separation of duties
Answer: D
QUESTION NO: 36
An employee is granted access to only areas of a network folder needed to perform their job.
Which of the following describes this form of access control?
A. Separation of duties
B. Time of day restrictions
C. Implicit deny
D. Least privilege
Answer: D
QUESTION NO: 37
A CRL is comprised of:
A. malicious IP addresses.
B. trusted CA’s.
C. untrusted private keys.
D. public keys.
Answer: D
QUESTION NO: 38
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
A. Logic bomb
B. Worm
C. Trojan
D. Adware
Answer: C
QUESTION NO: 39
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
A. Virtualization
B. RAID
C. Load balancing
D. Server clustering
Answer: B
QUESTION NO: 40
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
A. CCTV
B. Environmental monitoring
C. Multimode fiber
D. EMI shielding
Answer: D
QUESTION NO: 41
To help prevent unauthorized access to PCs, a security administrator implements screen savers
that lock the PC after five minutes of inactivity. Which of the following controls is being described
in this situation?
A. Management
B. Administrative
C. Technical
D. Operational
Answer: C
QUESTION NO: 42
Pete, a network administrator, is capturing packets on the network and notices that a large amount
of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment
that traffic from the other traffic?
A. Connect the WAP to a different switch.
B. Create a voice VLAN.
C. Create a DMZ.
D. Set the switch ports to 802.1q mode.
Answer: B
QUESTION NO: 43
Which of the following IP addresses would be hosts on the same subnet given the subnet mask
255.255.255.224? (Select TWO).
A. 10.4.4.125
B. 10.4.4.158
C. 10.4.4.165
D. 10.4.4.189
E. 10.4.4.199
Answer: C,D
QUESTION NO: 44
Which of the following algorithms has well documented collisions? (Select TWO).
A. AES
B. MD5
C. SHA
D. SHA-256
E. RSA
Answer: B,C
QUESTION NO: 45
Jane, the security administrator, needs to be able to test malicious code in an environment where
it will not harm the rest of the network. Which of the following would allow Jane to perform this kind
of testing?
A. Local isolated environment
B. Networked development environment
C. Infrastructure as a Service
D. Software as a Service
Answer: A
QUESTION NO: 46
A company is sending out a message to all users informing them that all internal messages need
to be digitally signed. This is a form of which of the following concepts?
A. Availability
B. Non-repudiation
C. Authorization
D. Cryptography
Answer: B
QUESTION NO: 47
Which of the following transportation encryption protocols should be used to ensure maximum
security between a web browser and a web server?
A. SSLv2
B. SSHv1
C. RSA
D. TLS
Answer: D
QUESTION NO: 48
Developers currently have access to update production servers without going through an approval
process. Which of the following strategies would BEST mitigate this risk?
A. Incident management
B. Clean desk policy
C. Routine audits
D. Change management
Answer: D
QUESTION NO: 49
A server containing critical data will cost the company $200/hour if it were to be unavailable due to
DoS attacks. The security administrator expects the server to become unavailable for a total of two
days next year. Which of the following is true about the ALE?
A. The ALE is $48.
B. The ALE is $400.
C. The ALE is $4,800.
D. The ALE is $9,600.
Answer: D
QUESTION NO: 50
To reduce an organization’s risk exposure by verifying compliance with company policy, which of
the following should be performed periodically?
A. Qualitative analysis
B. Quantitative analysis
C. Routine audits
D. Incident management
Answer: C
QUESTION NO: 51
Which of the following is a difference between TFTP and FTP?
A. TFTP is slower than FTP.
B. TFTP is more secure than FTP.
C. TFTP utilizes TCP and FTP uses UDP.
D. TFTP utilizes UDP and FTP uses TCP.
Answer: D
QUESTION NO: 52
A system administrator decides to use SNMPv3 on the network router in AuthPriv mode. Which of
the following algorithm combinations would be valid?
A. AES-RC4
B. 3DES-MD5
C. RSA-DSA
D. SHA1-HMAC
Answer: B
QUESTION NO: 53
Which of the following are encryption algorithms that can use a 128-bit key size? (Select TWO).
A. AES
B. RC4
C. Twofish
D. DES
E. SHA2
Answer: A,C
QUESTION NO: 54
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server.
After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in
sequence again. Which of the following utilities was he MOST likely using to view this issue?
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer
Answer: B
QUESTION NO: 55
Which of the following specifications would Sara, an administrator, implement as a network access
control?
A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x
Answer: D
QUESTION NO: 56
Which of the following is characterized by an attacker attempting to map out an organization’s staff
hierarchy in order to send targeted emails?
A. Whaling
B. Impersonation
C. Privilege escalation
D. Spear phishing
Answer: A
QUESTION NO: 57
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order
to perform malicious activities?
A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing
Answer: D
QUESTION NO: 58
Which of the following provides the MOST protection against zero day attacks via email
attachments?
A. Anti-spam
B. Anti-virus
C. Host-based firewalls
D. Patch management
Answer: A
QUESTION NO: 59
Which of the following would MOST likely ensure that swap space on a hard disk is encrypted?
A. Database encryption
B. Full disk encryption
C. Folder and file encryption
D. Removable media encryption
Answer: B
QUESTION NO: 60
Which of the following access controls enforces permissions based on data labeling at specific
levels?
A. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control
Answer: A
QUESTION NO: 61
A username provides which of the following?
A. Biometrics
B. Identification
C. Authorization
D. Authentication
Answer: B
QUESTION NO: 62
Use of group accounts should be minimized to ensure which of the following?
A. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability
Answer: D
QUESTION NO: 63
Privilege creep among long-term employees can be mitigated by which of the following
procedures?
A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
Answer: A
QUESTION NO: 64
In which of the following scenarios is PKI LEAST hardened?
A. The CRL is posted to a publicly accessible location.
B. The recorded time offsets are developed with symmetric keys.
C. A malicious CA certificate is loaded on all the clients.
D. All public keys are accessed by an unauthorized user.
Answer: C
QUESTION NO: 65
Configuring the mode, encryption methods, and security associations are part of which of the
following?
A. IPSec
B. Full disk encryption
C. 802.1x
D. PKI
Answer: A
QUESTION NO: 66
Which of the following assessments would Pete, the security administrator, use to actively test that
an application’s security controls are in place?
A. Code review
B. Penetration test
C. Protocol analyzer
D. Vulnerability scan
Answer: B
QUESTION NO: 67
Which of the following would be used to identify the security posture of a network without actually
exploiting any weaknesses?
A. Penetration test
B. Code review
C. Vulnerability scan
D. Brute Force scan
Answer: C
QUESTION NO: 68
A security administrator has just finished creating a hot site for the company. This implementation
relates to which of the following concepts?
A. Confidentiality
B. Availability
C. Succession planning
D. Integrity
Answer: B
QUESTION NO: 69
In the initial stages of an incident response, Matt, the security administrator, was provided the hard
drives in question from the incident manager. Which of the following incident response procedures
would he need to perform in order to begin the analysis? (Select TWO).
A. Take hashes
B. Begin the chain of custody paperwork
C. Take screen shots
D. Capture the system image
E. Decompile suspicious files
Answer: A,D
QUESTION NO: 70
Which of the following is used to certify intermediate authorities in a large PKI deployment?
A. Root CA
B. Recovery agent
C. Root user
D. Key escrow
Answer: A
QUESTION NO: 71
Which of the following components MUST be trusted by all parties in PKI?
A. Key escrow
B. CA
C. Private key
D. Recovery key
Answer: B
QUESTION NO: 72
Which of the following should Matt, a security administrator, include when encrypting
smartphones? (Select TWO).
A. Steganography images
B. Internal memory
C. Master boot records
D. Removable memory cards
E. Public keys
Answer: B,D
QUESTION NO: 73
When checking his webmail, Matt, a user, changes the URL’s string of characters and is able to
get into another user’s inbox. This is an example of which of the following?
A. Header manipulation
B. SQL injection
C. XML injection
D. Session hijacking
Answer: D
QUESTION NO: 74
Elliptic curve cryptography: (Select TWO)
A. is used in both symmetric and asymmetric encryption.
B. is used mostly in symmetric encryption.
C. is mostly used in embedded devices.
D. produces higher strength encryption with shorter keys.
E. is mostly used in hashing algorithms.
Answer: C,D
QUESTION NO: 75
Which of the following is the below pseudo-code an example of?
IF VARIABLE (CONTAINS NUMBERS = TRUE) THEN EXIT
A. Buffer overflow prevention
B. Input validation
C. CSRF prevention
D. Cross-site scripting prevention
Answer: B
QUESTION NO: 76
Which of the following would an antivirus company use to efficiently capture and analyze new and
unknown malicious attacks?
A. Fuzzer
B. IDS
C. Proxy
D. Honeynet
Answer: D
QUESTION NO: 77
Why is it important for a penetration tester to have established an agreement with management as
to which systems and processes are allowed to be tested?
A. Penetration test results are posted publicly, and some systems tested may contain corporate
secrets.
B. Penetration testers always need to have a comprehensive list of servers, operating systems, IP
subnets, and department personnel prior to ensure a complete test.
C. Having an agreement allows the penetration tester to look for other systems out of scope and
test them for threats against the in-scope systems.
D. Some exploits when tested can crash or corrupt a system causing downtime or data loss.
Answer: D
QUESTION NO: 78
A system administrator is using a packet sniffer to troubleshoot remote authentication. The
administrator detects a device trying to communicate to TCP port 49. Which of the following
authentication methods is MOST likely being attempted?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
Answer: B
QUESTION NO: 79
An administrator wants to minimize the amount of time needed to perform backups during the
week. It is also acceptable to the administrator for restoration to take an extended time frame.
Which of the following strategies would the administrator MOST likely implement?
A. Full backups on the weekend and incremental during the week
B. Full backups on the weekend and full backups every day
C. Incremental backups on the weekend and differential backups every day
D. Differential backups on the weekend and full backups every day
Answer: A
QUESTION NO: 80
Which of the following can be used in code signing?
A. AES
B. RC4
C. GPG
D. CHAP
Answer: C
QUESTION NO: 81
Which of the following can use RC4 for encryption? (Select TWO).
A. CHAP
B. SSL
C. WEP
D. AES
E. 3DES
Answer: B,C
QUESTION NO: 82
Which of the following defines a business goal for system restoration and acceptable data loss?
A. MTTR
B. MTBF
C. RPO
D. Warm site
Answer: C
QUESTION NO: 83
Which of the following defines an organization goal for acceptable downtime during a disaster or
other contingency?
A. MTBF
B. MTTR
C. RTO
D. RPO
Answer: C
QUESTION NO: 84
If Organization A trusts Organization B and Organization B trusts Organization C, then
Organization A trusts Organization C. Which of the following PKI concepts is this describing?
A. Transitive trust
B. Public key trust
C. Certificate authority trust
D. Domain level trust
Answer: A
QUESTION NO: 85
Which of the following is an attack vector that can cause extensive physical damage to a
datacenter without physical access?
A. CCTV system access
B. Dial-up access
C. Changing environmental controls
D. Ping of death
Answer: C
QUESTION NO: 86
Which of the following concepts is BEST described as developing a new chain of command in the
event of a contingency?
A. Business continuity planning
B. Continuity of operations
C. Business impact analysis
D. Succession planning
Answer: D
QUESTION NO: 87
An ACL placed on which of the following ports would block IMAP traffic?
A. 110
B. 143
C. 389
D. 465
Answer: B
QUESTION NO: 88
Which of the following provides the HIGHEST level of confidentiality on a wireless network?
A. Disabling SSID broadcast
B. MAC filtering
C. WPA2
D. Packet switching
Answer: C
QUESTION NO: 89
Which of the following controls should be used to verify a person in charge of payment processing
is not colluding with anyone to pay fraudulent invoices?
A. Least privilege
B. Security policy
C. Mandatory vacations
D. Separation of duties
Answer: C
QUESTION NO: 90
Which of the following allows a company to maintain access to encrypted resources when
employee turnover is high?
A. Recovery agent
B. Certificate authority
C. Trust model
D. Key escrow
Answer: A
QUESTION NO: 91
Which of the following should be implemented to stop an attacker from mapping out addresses
and/or devices on a network?
A. Single sign on
B. IPv6
C. Secure zone transfers
D. VoIP
Answer: C
QUESTION NO: 92
Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the
following would provide the BEST level of protection?
A. HIPS
B. Antivirus
C. NIDS
D. ACL
Answer: A
QUESTION NO: 93
Which of the following protocols is used to authenticate the client and server’s digital certificate?
A. PEAP
B. DNS
C. TLS
D. ICMP
Answer: C
QUESTION NO: 94
Which of the following anti-malware solutions can be implemented to mitigate the risk of phishing?
A. Host based firewalls
B. Anti-spyware
C. Anti-spam
D. Anti-virus
Answer: C
QUESTION NO: 95
Which of the following can be used to mitigate risk if a mobile device is lost?
A. Cable lock
B. Transport encryption
C. Voice encryption
D. Strong passwords
Answer: D
QUESTION NO: 96
Which of the following security concepts would Sara, the security administrator, use to mitigate the
risk of data loss?
A. Record time offset
B. Clean desk policy
C. Cloud computing
D. Routine log review
Answer: B
QUESTION NO: 97
Which of the following is an example of multifactor authentication?
A. Credit card and PIN
B. Username and password
C. Password and PIN
D. Fingerprint and retina scan
Answer: A
QUESTION NO: 98
After Matt, a user, enters his username and password at the login screen of a web enabled portal,
the following appears on his screen:
‘Please only use letters and numbers on these fields’
Which of the following is this an example of?
A. Proper error handling
B. Proper input validation
C. Improper input validation
D. Improper error handling
Answer: B
QUESTION NO: 99
Which of the following should the security administrator do when taking a forensic image of a hard
drive?
A. Image the original hard drive, hash the image, and analyze the original hard drive.
B. Copy all the files from the original into a separate hard drive, and hash all the files.
C. Hash the original hard drive, image the original hard drive, and hash the image.
D. Image the original hard drive, hash the original hard drive, and analyze the hash.
Answer: C