TrainACE - IT and Cybersecurity Training Blog

Security+ Practice Test

[fa icon="calendar"] Feb 19, 2014 11:30:42 AM / by alan

Certificate of Validity

The Security+ Practice Test is a well-known valuable asset within the IT Industry. A reason for obtaining such certification is to enhance your professional profile within the information technology industry. IT Security is growing at an increasing rate, meaning more jobs for those with proper credentials and qualifications. As a $60 billion industry with rapid growth, certification of authenticity will give your resume that extra boost in a demanding field.

Whether you are seeking to get a job, strengthen your current skills, or get a promotion, the accuracy of your ingenuity must meet a certain criteria set in place by employers. Having what it takes comes natural; confirming aptitude through certification takes practice.

Practice Questions and Exam Objectives

There are a tremendous amount of free tools and materials out there to help you get ready for the actual test. The Security + practice test allows you to narrow down why you are taking the test and gives you an idea of what to expect on the real assessment as well as the fundamental information about which objectives will be on the test. Once you understand what to look for and why, you can strengthen your weaknesses.

You can test your skills by taking a Security+ practice test. Taking a practice test will build your skills and confidence whether you are already taking a course or looking to get started.

Security+ Practice Test Questions

Use the practice test questions below to test your Security+ knowledge. Write down all yours answers, then scroll down to see the answers below.

– Begin Practice Test Questions –

  1. When someone uses the information of another to conceal their identity, what crime would they be committing?
  2. What do Security Professionals consider not a configuration weakness?
  3. When companies need to fix security vulnerabilities in their product, they configure ______ to be given to their customers.
  4. True or False, the typical goal of a baseline configuration is to cover 80% of your workforce.
  5. A program that poses as a safe file to cause malicious intent is called a?
  6. Windows has a built-in spyware protection module, what is it called?
  7. True or False, Internet Explorer 8 has a built in phishing filter called SmartScreen?
  8. True or False, AES is based on the Rijndael Ciper?
  9. What Cipher was developed to replace DES without patents?
  10. Kerberos refers to a subset of users as a?
  11. True or False, Kerberos Authenticator only keeps a timestamp valid for 2 minutes?
  12. Logging in with a username and password is a form of?
  13. The EFS file system can be used to protect what?
  14. Digital certificates mostly use what standard?
  15. When a hacker uses software to use your logon state at a secure website it is called?

– End Practice Test Questions–

Scroll Down To  See Answers


Scroll Down To  See Answers


Scroll Down To  See Answers


Scroll Down To  See Answers


– Begin Practice Test Answers –

  1. Identity Theft
  2. Human Ignorance
  3. Patches
  4. True
  5. Trojan Horse
  6. Windows Defender
  7. True
  8. True
  9. blowfist
  10. realm
  11. False, the Kerberos Authenticator holds timestamps as valid for 5 minutes.
  12. Single-factor authentication
  13. Files and folders
  14. X.509
  15. Session Hijacking (Sidejacking)

– End Practice Test Answers –

Taking the Test

How did you do on the mini quiz? If you got all the answers correct you may be ready for the test, however you should complete the full version of the practice test and read over the explanation of each answer, just to be safe. After all this is the security business.

Topics: CompTIA, Cybersecurity, Security+


Written by alan

Need IT Certifications?
Want more info?

Call (301) 220-2802

Speak with a Program Manager