Free Security+ Practice Test Questions

Posted by in Security+ | 6 comments

Can you answer these Security+ Practice Test Questions? 

This page includes six free Security+ practice test questions, one from each of the six domains in the Security+ SY0-401 exam. Click here for another set of six practice test questions when you’re done.

Security+ Practice Test Questions

These practice test questions came from the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide. The Study Guide includes full explanations of all the objectives and includes over 440 realistic practice test questions.

Security+ Practice Test Question 1

Q. Of the following choices, what is the best choice for a device to filter and cache content from web pages?

A. Web server
B. VPN concentrator
C. Proxy server
D. MAC filtering

Answer below.


Security+ Practice Test Question 2

Q. Employees in the accounting department are forced to take time off from their duties on a regular basis. What would direct this?

A. Account disablement policy
B. Mandatory vacation policy
C. Job rotation policy
D. Dual accounts for administrators

Answer below.


Pass the Security+ SY0-401 exam the first time you take it
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide


Security+ Practice Test Question 3

Q. What type of malware do users inadvertently install with USB thumb drives?

A. Spam
B. Trojans
C. Buffer overflow
D. Logic bomb

Answer below.


 

Security+ Practice Test Question 4

Q. An attacker is entering incorrect data into a form on a web page. The result shows the attacker the type of database used by the website and provides hints on what SQL statements the database accepts. What can prevent this?

A. Error handling
B. Antivirus software
C. Antispam software
D. Flood guards

Answer below.


Security+ Practice Test Question 5

Q. A user is issued a token with a number displayed in an LCD. What does this provide?

A. Rolling password for one-time use
B. Multifactor authentication
C. CAC
D. PIV

Answer below.


 

Security+ Practice Test Question 6

Q. Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account that had exclusive access to her private key. Can this project file be retrieved?

A. No. If the private key is lost, the data cannot be retrieved.
B. Yes. The public key can decrypt the file.
C. Yes, if a copy of her public key is stored in escrow.
D. Yes, if the organization uses a recovery agent.

Answer below.

Security+ Practice Test Questions

SYO-501 Practice Test Questions Now Available

SYO-401 Practice Test Questions

Over 440 realistic Security+ practice test questions

All questions include explanations so you'll know why the correct answers are correct,

and why the incorrect answers are incorrect.

Pass the Security+ Exam

the First Time You Take It

Multiple quiz formats to let you use these questions based on the way you learn.
  • Learn mode - randomized. View each of the questions in random order. Learn mode allows you to keep selecting answers until you select the correct answer. Once you select the correct answer, you'll see the explanation. Click here to see how learn mode works.
  • Learn mode - not randomized. View each of the questions in the same order. Use this if you want to make sure that you see all of the questions. Learn mode allows you to keep selecting answers until you select the correct answer. Once you select the correct answer, you'll see the explanation. Click here to see how learn mode works.
  • Test mode - randomized. View each of the questions in random order. In test mode, you can only see the correct answers and explanations after you complete the test. Click here to see how test mode works.
  • Test mode - not randomized. View each of the questions in the same order. In test mode, you can only see the correct answers and explanations after you complete the test. Click here to see how test mode works.
  • Test mode - 100 random questions. View 100 random questions from the full test bank similar to how the Security+ exam has a potential maximum of 100 multiple choice questions. In test mode, you can only see the correct answers and explanations after you complete the test. Click here to see how test mode works.

Get the full bank of Security+ (SYO-401) Practice Test Questions Here

 SYO-401 Practice Test Questions


INCLUDES QUESTIONS TO HELP YOU PREPARE

FOR THE NEW PERFORMANCE BASED QUESTIONS 

Bonus - Performance Based Questions

Additional Security+ questions to help you prepare for the new performance based questions. These are included with the full bank of Security+ practice test questions and are divided into different sections. For example, you'll have access to the following links:

- Performance Based Question - Set 1

You'll see a graphic explaining what you might be required to do on the actual exam to match different types of security to mobile devices and servers in a data center. You'll then have two questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 2

You'll see a graphic explaining what you might be required to do on the actual exam to match different types of attacks with the name of the attack type. You'll then have five questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 3

You'll see a graphic showing a network with computers and servers separated by a firewall. The firewall is used to control traffic between the computers and users using rules within an access control list (ACL).  You'll have three questions that test your knowledge and ability to correctly identify the relevant components of the rule. The incorrect answers and explanation provide you with insight into how to correctly answer this type of question on the actual exam.

- Performance Based Question - Set 4

You'll see a graphic explaining what you might be required to do on the actual exam related to what a forensic analyst would do during an investigation. You'll then have two questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 5

You'll see a graphic explaining what you might be required to do on the actual exam to match protocols and ports. You'll then have seven questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 6

You'll see a list of security controls along with a graphic showing devices and locations within an organization, along with instructions on what you might be required to do on the actual exam to match the controls with the devices and locations. You'll then have four questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 7

You'll see a list of authentication methods and authentication factors along with instructions on what you might be required to do on the actual exam to match the authentication methods with the authentication factors. You'll then have six questions that test your knowledge and ability to correctly answer the questions. This set also includes a link to a graphic showing the end solution for the overall performance based question simulation.

- Performance Based Question - Set 8

You'll see a graphic explaining what you might be required to do on the actual exam to match different types of attacks with the name of the attack type. You'll then have five questions that test your knowledge and ability to correctly answer the questions. This is similar to Set 2 but expands on the possibilities. The set also includes a link to a page showing the end solution for the overall performance based question simulation.

New - Performance Based Question - Set 9

New questions recently added using a different testing engine. See a demo here. This set includes drag and drop and matching questions on ports.

New - Performance Based Question - Set 10

A random set of 20 performance-based questions using drag and drop, matching, sorting, and fill in-the blank. This set includes performance-based questions on RAID.

Get the full bank of Security+ (SYO-401) Practice Test Questions Here

Get the full bank of Security+ Practice Test Questions

Click here if you're looking for SYO-501 Practice Test Questions


 

Answers to Practice Test Questions

Answer to Question 1

Q. Of the following choices, what is the best choice for a device to filter and cache content from web pages?

A. Web server
B. VPN concentrator
C. Proxy server
D. MAC filtering

Ans: C is correct. A proxy server includes the ability to filter and cache content from web pages.

A is incorrect. A web server serves web pages. It doesn’t filter and cache content from web pages.

B is incorrect. A VPN concentrator provides access to VPN clients.

D is incorrect. MAC filtering can be used with port security on a switch, but doesn’t filter web page content.

Objective: 1.1 Explain the security function and purpose of network devices and technologies

Check out this blog post to learn more.

Back to Top


 

Get Certified Get Ahead

Answer to Question 2

Q. Employees in the accounting department are forced to take time off from their duties on a regular basis. What would direct this?

A. Account disablement policy
B. Mandatory vacation policy
C. Job rotation policy
D. Dual accounts for administrators

Ans. B is correct. Mandatory vacation policies require employees to take time away from their job and help to detect fraud or malicious activities.

A is incorrect. An account disablement policy (sometimes called an account expiration policy) specifies when to disable accounts.

C is incorrect. Job rotation policies require employees to change roles on a regular basis.

D is incorrect. Dual accounts for administrators help prevent privilege escalation attacks.

Objective: 2.1 Explain risk related concepts

Check out this post to learn more.

Back to Top


 

Answer to Question 3

Q. What type of malware do users inadvertently install with USB thumb drives?

A. Spam
B. Trojans
C. Buffer overflow
D. Logic bomb

Ans. B is correct. Users can unknowingly transfer and install Trojan horse malware onto their systems with USB thumb drives.

A is incorrect. Spam is unwanted email filtered with antispam software.

C is incorrect. A buffer overflow occurs when a system receives unexpected data or more data than program can handle.

D is incorrect. A logic bomb is a program or code snippet that executes in response to an event, such as a specific time or date.

Objective: 3.1 Analyze and differentiate among types of malware

Check out this post to learn more.

Back to Top


 

Answer to Question 4

Q. An attacker is entering incorrect data into a form on a web page. The result shows the attacker the type of database used by the website and provides hints on what SQL statements the database accepts. What can prevent this?

A. Error handling
B. Antivirus software
C. Antispam software
D. Flood guards

Ans. A is correct. Error handling will return a generic error web page rather than a detailed error that can provide an attacker with valuable information to launch a SQL injection attack.

B is incorrect. Antivirus software can detect malware, such as viruses and worms, and prevent it from running on a computer.

C is incorrect. Antispam software can filter out unwanted or unsolicited email (also called spam).

D is incorrect. Flood guards can prevent SYN flood attacks.

Objective: 4.1 Explain the importance of application security

Check out this post to learn more.

Back to Top


 

Answer to Question 5

Q. A user is issued a token with a number displayed in an LCD. What does this provide?

A. Rolling password for one-time use
B. Multifactor authentication
C. CAC
D. PIV

Ans. A is correct. A token (such as an RSA token) provides a rolling password for one-time use.

B is incorrect. While it can be used with multifactor authentication (requiring the user to also enter other information such as a password), it doesn’t provide multifactor authentication by itself.

C and D are incorrect. A CAC and a PIV are both specialized types of smart cards that include photo identification.

Objective: 5.2 Explain the fundamental concepts and best practices related to authentication, authorization and access control.

Check out this post to learn more.

Back to Top


 

Answer to Question 6

Q. Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account that had exclusive access to her private key. Can this project file be retrieved?

A. No. If the private key is lost, the data cannot be retrieved.
B. Yes. The public key can decrypt the file.
C. Yes, if a copy of her public key is stored in escrow.
D. Yes, if the organization uses a recovery agent.

Ans. D is correct. If an organization uses a recovery agent, the recovery agent can decrypt the file, in some cases by recovering a copy of the private key, and in other cases by using a special recovery agent key.

A and B are incorrect. Data encrypted with a public key cannot be decrypted with the same public key.

C is incorrect. A private key is stored in escrow, but a public key would not be stored in escrow.

Objective: 6.3 Explain the core concepts of public key infrastructure

Check out this post to learn more.

Back to Top


6 Comments

  1. “Q. Of the following choices, what is the best choice for a device to filter and cache content from web pages?

    A. Web security gateway
    B. VPN concentrator
    C. Proxy server
    D. MAC filtering”

    I feel like the answer to this question is both A and C. I am happy to accept that the best choice for web page caching is a proxy server, however the best choice to filter website content is most certainly a web security gateway. Keyword: filtering. Both options are capable of doing filtering and caching, where A is better at filtering and D is better at caching. In the same way that some web gateways are incapable or performing web caching, some proxy servers are also incapable of filtering.

    • Thanks for the feedback. You’re correct.

      What I’ve seen is that web security gateways didn’t originally have caching though it has been added as a feature in many web security gateways. I still don’t see it as a universal feature in all web security gateways though all proxy servers include both filtering and caching. With that in mind, it could be argued that proxy server is the BEST answer.

      Still, the intent of the question isn’t meant to include two possible correct answers.

      I changed the web security gateway answer to web server to eliminate the subtlety.

      As an FYI, CompTIA seems to be using the term unified threat management (UTM) more than web security gateways these days. For example, the newest version of the CASP exam eliminates Web Security Gateways but include UTMs.

      Thanks again for the feedback.

  2. If a question states, “Sally encrypted a project file with her public key. Later, an administrator accidentally deleted her account that had exclusive access to her private key. Can this project file be retrieved?” — is it not safe to assume that “exclusive access to there private key” means no one else can access it apart from that account?

    The correct answer here seems to assume that “a recovery agent can recover keys that are placed in escrow” — but that contradicts the original statement in the question. What’s the best strategy for handling clumsily/inaccurately worded questions like this? I suspect there will be a few on the CompTIA test.
    Thanks.

    • Kit, this is an example of “pick the best answer.” Also, the explanation provides a broader view of the topic. Let me explain.

      > is it not safe to assume that “exclusive access to there private key” means
      > no one else can access it apart from that account?

      exclusive access to there private key

      You can assume that the no one else can access the private key if the user had exclusive access.

      However, a recovery agent can decrypt the file by using a special recovery agent key. As an example, Microsoft NTFS encryption often encrypts files but embeds both the user’s key and the recovery agent’s key within the file so that either the user or the recovery agent can decrypt the file. That’s why D is correct.

      The explanation gives a broader explanation of the recovery agent.

      If an organization uses a recovery agent, the recovery agent can decrypt the file,
      – in some cases by recovering a copy of the private key,
      – and in other cases by using a special recovery agent key.

      On the actual exam, I recommend looking for the best answer and looking for subtleties in the question.

      One of the things I often repeat is that ideally, you should be able to look at any question and know why the correct answer is correct and why the incorrect answers are incorrect. This way, no matter how CompTIA words the questions, you’ll be able to answer them correctly. My intention with the explanations in questions I write is to help you understand the correct answer is correct and why the incorrect answers are incorrect.

      Hope this helps.

  3. You can think of key escrow as the process of putting the private key in a safe environment. The purpose is to ensure that it is available for recovery, but placing the key into escrow doesn’t recover it.

    A recovery agent is a designated individual that can recover keys or data For example, a recovery agent can recover keys that are placed in escrow. In Microsoft systems, a recovery agent can recover data using a recovery agent key if the original key is lost.

    Hope this helps.

  4. What is the difference between a key escrow and a recovery agent, both recover private keys

Leave a Comment

CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide

Subscribe To Our Newsletter

Join our mailing list and get a free excerpt of the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide.  This excerpt includes the introduction and Chapter 1. 

You have Successfully Subscribed!

Get Certified Get Ahead is a participant in the Amazon Services LLC Associates Program,
an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

Copyright © 2015 Get Certified Get Ahead. All Rights Reserved.