CompTIA Security+ is an entry-level certification that develops network security knowledge. CompTIA certification covers IT concepts, basic IT literacy, and terminology. It's the first step toward the A+ certification. Take this quiz to test your fundamentals about Comptia security+. Let's try it out. All the best!
Enable ESSID broadcast
Enable protected management frames
Enable wireless encryption
Disable MAC authentication
Disable WPS
Disable SSID broadcast
Rate this question:
Require the use of an eight-character PIN.
Implement containerization of company data
Require annual AUP sign-off.
Use geofencing tools to unlock devices while on the premises
Rate this question:
Exploiting misconfigured applications
Cracking employee passwords
Sending phishing emails to employees
Identifying unpatched workstations
Rate this question:
Script kiddie
Hacktivist
Cryptologist
Security auditor
Rate this question:
Lessons learned
Recovery
Identification
Preparation
Rate this question:
Insider threats
Privilege escalation
Hacktivist
Phishing through social media
Corporate espionage
Rate this question:
Remote exploit
Amplification
Sniffing
Man-in-the-middle
Rate this question:
Faraday cages
Motion-detection sensors
Tall, chain-link fencing
Security guards
Smart cards
Rate this question:
Backdoor
Pivoting
Persistance
Logic bomb
Rate this question:
Transference
Acceptance
Mitigation
Deterrence
Rate this question:
Faraday cage
Smart cards
Infrared detection
Alarms
Rate this question:
Escalation of privilege
SQL injection
Active reconnaissance
Proxy server
Rate this question:
PIN
Security Question
Smart card
Passphrase
CAPTCHA
Rate this question:
Maintain the chain of custody.
Preserve the data.
Obtain a legal hold.
Recover data at a later time
Rate this question:
Download manager
Content manager
Segmentation manager
Application manager
Rate this question:
Fuzzing
Static preview
Code signing
Regression testing
Rate this question:
High availability
Scalability
Distributive allocation
Load balancing
Rate this question:
Insufficient key bit length
Weak cipher suite
Unauthenticated encryption method
Poor implementation
Rate this question:
Non-intrusive
Authenticated
Credentialed
Active
Rate this question:
Make a copy of everything in memory on the workstation.
Turn off the workstation.
Consult information security policy.
Run a virus scan.
Rate this question:
Hash function
Elliptic curve
Symmetric algorithm
Public key cryptography
Rate this question:
Abnormally high numbers of outgoing instant messages that contain obfuscated text
Large-capacity USB drives on the tester's desk with encrypted zip files
Outgoing emails containing unusually large image files
Unusual SFTP connections to a consumer IP address
Rate this question:
Public key
Shared key
Elliptic curve
MD5
Private key
DES
Rate this question:
PaaS
SaaS
IaaS
BaaS
Rate this question:
The scanner must be able to enumerate the host OS of devices scanned.
The scanner must be able to footprint the network.
The scanner must be able to check for open ports with listening services
The scanner must be able to audit file system permissions
Rate this question:
Ransomware
Rootkit
Backdoor
Keylogger
Rate this question:
Open ID Connect
SAML
XACML
LDAP
Rate this question:
ARO
ROI
RPO
SLE
RTO
Rate this question:
Full backup
Incremental backup
Differential backup
Snapshot
Rate this question:
Put the desktops in the DMZ.
Create a separate VLAN for the desktops.
Air gap the desktops.
Join the desktops to an ad-hoc network
Rate this question:
To prevent duplicate values from being stored
To make the password retrieval process very slow
To protect passwords from being saved in readable format
To prevent users from using simple passwords for their access credentials
Rate this question:
SAML
LDAP
OAuth
Shibboleth
Rate this question:
Tunnel mode IPSec
Transport mode VPN IPSec
L2TP
SSL VPN
Rate this question:
Security awareness training
Antivirus
Firewalls
Intrusion detection system
Rate this question:
TLS1.0 with CBC mode cipher
SSLv2.0 with CBC mode cipher
SSLv3.0 with CBC mode cipher
SSLv3.0 with ECB mode cipher
Rate this question:
XOR
PBKDF2
Bcrypt
HMAC
RIPEMD
Rate this question:
The MTTR is faster.
The MTTR is slower.
The RTO has increased.
The RTO has decreased.
The MTTF has increased.
The MTTF has decreased.
Rate this question:
Non-repudiation
Email content encryption
Steganography
Transport security
Message integrity
Rate this question:
The SELinux mode on the server is set to "enforcing."
The SELinux mode on the server is set to "permissive."
An FACL has been added to the permissions for the file.
The admins group does not have adequate permissions to access the file.
Rate this question:
Permission issues
Access violations
Certificate issues
Misconfigured devices
Rate this question:
Logic bomb
Backdoor
Keylogger
Netstat
Tracert
Ping
Rate this question:
PEAP
PSK
Open systems authentication
EAP-TLS
Captive portals
Rate this question:
SaaS
CASB
IaaS
PaaS
Disable the compromised accounts
Update WAF rules to block social networks
Remove the compromised accounts with all AD groups
Change the compromised accounts' passwords
Disable the open relay on the email server
Enable sender policy framework
Rate this question:
An attacker could potentially perform a downgrade attack.
The connection is vulnerable to resource exhaustion.
The integrity of the data could be at risk.
The VPN concentrator could revert to L2TP.
The IPSec payload reverted to 16-bit sequence numbers.
Rate this question:
PermitTunnel
ChrootDirectory
PermitTTY
AllowTcpForwarding
IgnoreRhosts
Rate this question:
Quiz Review Timeline (Updated): Oct 24, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.