This CompTIA Security+ Exam MCQ quiz assesses knowledge in maintaining security protocols, detecting various malware types, and managing network security tools. It is designed for learners aiming to validate their cybersecurity expertise and prepare for professional certification.
A. Credentialed scan.
B. Non-intrusive scan.
C. Privilege escalation test.
D. Passive scan.
Rate this question:
A. AES
B. 3DES
C. RSA
D. MD5
Rate this question:
A. Rootkit
B. Ransomware
C. Trojan
D. Backdoor
Rate this question:
A. The firewall should be configured to prevent user traffic from matching the implicit deny rule.
B. The firewall should be configured with access lists to allow inbound and outbound traffic.
C. The firewall should be configured with port security to allow traffic.
D. The firewall should be configured to include an explicit deny rule.
Rate this question:
C. dig ""axfr comptia.org @example.org
D. ipconfig /flushDNS -
F. dig @example.org comptia.org -
Rate this question:
A. To prevent server availability issues
B. To verify the appropriate patch is being installed
C. To generate a new baseline hash after patching
D. To allow users to test functionality
E. To ensure users are trained on new functionality
Rate this question:
A. ISA
B. NDA
C. MOU
D. SLA
Rate this question:
A. Username, PIN, and employee ID number
B. Fingerprint and password
C. Smart card and hardware token
D. Voice recognition and retina scan
Rate this question:
A. Separation of duties
B. Mandatory vacations
C. Background checks
D. Security awareness training
Rate this question:
A. Enable IPSec and configure SMTP.
B. Enable SSH and LDAP credentials.
C. Enable MIME services and POP3.
D. Enable an SSL certificate for IMAP services.
Rate this question:
A. Cross-site scripting
B. DNS poisoning
C. Typo squatting
D. URL hijacking
Rate this question:
A. Apache
B. LSASS
C. MySQL
D. TFTP
Rate this question:
A. RADIUS
B. TACACS+
C. Diameter
D. Kerberos
Rate this question:
A. Authentication
B. HVAC
C. Full-disk encryption
D. File integrity checking
Rate this question:
A. Black box
B. Regression
C. White box
D. Fuzzing
Rate this question:
A. Removing the hard drive from its enclosure
B. Using software to repeatedly rewrite over the disk space
C. Using Blowfish encryption on the hard drives
D. Using magnetic fields to erase the data
Rate this question:
A. Load balancers
B. Application layer firewalls
C. Reverse proxies
D. VPN concentrators
E. Routers
Rate this question:
A. FTPS
B. SFTP
C. SSL
D. LDAPS
E. SSH
Rate this question:
A. Isolating the systems using VLANs
B. Installing a software-based IPS on all devices
C. Enabling full disk encryption
D. Implementing unique user PIN access functions
Rate this question:
A. Recovery
B. Identification
C. Preparation
D. Documentation
E. Escalation
Rate this question:
A. HTTPS
B. LDAPS
C. SCP
D. SNMPv3
Rate this question:
A. The finding is a false positive and can be disregarded
B. The Struts module needs to be hardened on the server
C. The Apache software on the server needs to be patched and updated
D. The server has been compromised by malware and needs to be quarantined.
Rate this question:
A. Geofencing
B. Remote wipe
C. Near-field communication
D. Push notification services
E. Containerization
Rate this question:
Phishing
Pretexting
SQL injection
Baiting
Rate this question:
A. CCM
B. CBC
C. GCM
D. DSA
E. CFB
Rate this question:
A. Implement separation of duties for the payroll department.
B. Implement a DLP solution on the payroll and human resources servers.
C. Implement rule-based access controls on the human resources server.
D. Implement regular permission auditing and reviews.
Rate this question:
A. EAP-FAST
B. EAP-TLS
C. PEAP
D. EAP
Rate this question:
A. Misconfigured firewall
B. Clear text credentials
C. Implicit deny
D. Default configuration
Rate this question:
A. Passwords are written on the bottom of a keyboard
B. Unpatched exploitable Internet-facing services
C. Unencrypted backup tapes
D. Misplaced hardware token
Rate this question:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch
Rate this question:
A. The vulnerability scanner is performing an authenticated scan.
B. The vulnerability scanner is performing local file integrity checks.
C. The vulnerability scanner is performing in network sniffer mode.
D. The vulnerability scanner is performing banner grabbing.
A. Waterfall
B. Agile
C. Rapid
D. Extreme
Rate this question:
A. Implement time-of-day restrictions.
B. Audit file access times.
C. Secretly install a hidden surveillance camera.
D. Require swipe-card access to enter the lab.
Rate this question:
A. Default configuration
B. End-of-life system
C. Weak cipher suite
D. Zero-day threats
Rate this question:
A. Approve the former employee's request, as a password reset would give the former employee access to only the human resources server.
B. Deny the former employee's request since the password reset request came from an external email address.
C. Deny the former employee's request, as a password reset would give the employee access to all network resources.
D. Approve the former employee's request, as there would not be a security issue with the former employee gaining access to network resources.
Rate this question:
A. Encrypt it with Joe's private key
B. Encrypt it with Joe's public key
C. Encrypt it with Ann's private key
D. Encrypt it with Ann's public key
Rate this question:
A. CSIRT
B. Containment phase
C. Escalation notifications
D. Tabletop exercise
Rate this question:
A. Create a daily encrypted backup of the relevant emails.
B. Configure the email server to delete the relevant emails.
C. Migrate the relevant emails into an "Archived" folder.
D. Implement automatic disk compression on email servers.
Rate this question:
A. The segment should be placed on a separate VLAN, and the firewall rules should be configured to allow external traffic.
B. The segment should be placed in the existing internal VLAN to allow internal traffic only.
C. The segment should be placed on an intranet, and the firewall rules should be configured to allow external traffic.
D. The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.
Rate this question:
A. Pharming
B. DDoS
C. Privilege escalation
D. DoS
Rate this question:
A. RC4
B. SHA-256
C. DES
D. AES
Rate this question:
A. Cross-site request forgery
B. Buffer overflow
C. SQL injection
D. JavaScript data insertion
E. Firewall evasion script
Rate this question:
A. The hacker used a race condition.
B. The hacker used a pass-the-hash attack.
C. The hacker-exploited improper key management.
D. The hacker exploited weak switch configuration.
A. Server001
B. Server101
C. Server201
D. Server301
Rate this question:
A. Implement SRTP between the phones and the PBX.
B. Place the phones and PBX in their own VLAN.
C. Restrict the phone connections to the PBX.
D. Require SIPS on connections to the PBX.
Rate this question:
A. Dynamic analysis
B. Change management
C. Baselining
D. Waterfalling
Rate this question:
A. Ping
B. Ipconfig
C. Tracert
D. Netstat
E. Dig
F. Nslookup
Rate this question:
A. Secure USB drive
B. Cable lock
C. Hardware OTP token
D. HASP key
Rate this question:
Quiz Review Timeline (Updated): Jan 13, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.