This CompTIA Security+ Exam MCQ quiz assesses knowledge in maintaining security protocols, detecting various malware types, and managing network security tools. It is designed for learners aiming to validate their cybersecurity expertise and prepare for professional certification.
A. Logic bomb
B. Trojan
C. Scareware
D. Ransomware
Rate this question:
A. Facial recognition
B. Fingerprint scanner
C. Motion detector
D. Smart cards
Rate this question:
A. Implement password expirations
B. Implement restrictions on shared credentials
C. Implement account lockout settings
D. Implement time-of-day restrictions on this server
Rate this question:
A. Architecture review
B. Risk assessment
C. Protocol analysis
D. Code review
Rate this question:
A. Username, PIN, and employee ID number
B. Fingerprint and password
C. Smart card and hardware token
D. Voice recognition and retina scan
Rate this question:
A. Isolating the systems using VLANs
B. Installing a software-based IPS on all devices
C. Enabling full disk encryption
D. Implementing unique user PIN access functions
Rate this question:
A. ISA
B. NDA
C. MOU
D. SLA
Rate this question:
A. Dynamic analysis
B. Change management
C. Baselining
D. Waterfalling
Rate this question:
A. Revision control system
B. Client side exception handling
C. Server side validation
D. Server hardening
Rate this question:
A. Pharming
B. DDoS
C. Privilege escalation
D. DoS
Rate this question:
A. Secure USB drive
B. Cable lock
C. Hardware OTP token
D. HASP key
Rate this question:
A. Jan Smith is an insider threat
B. There are MD5 hash collisions
C. The file is encrypted
D. Shadow copies are present
Rate this question:
A. Application fuzzing
B. Error handling
C. Input validation
D. Pointer dereference
Rate this question:
A. Cross-site scripting
B. DNS poisoning
C. Typo squatting
D. URL hijacking
Rate this question:
A. Black box
B. Regression
C. White box
D. Fuzzing
Rate this question:
A. Account lockout thresholds
B. Account recovery
C. Password expiration
D. Prohibit password reuse
Rate this question:
A. Reuse
B. Length
C. History
D. Complexity
Rate this question:
A. Deactivation of SSID broadcast
B. Reduction of WAP signal output power
C. Activation of 802.1X with RADIUS
D. Implementation of MAC filtering
E. Beacon interval was decreased
Rate this question:
A. Chain of custody
B. Order of volatility
C. Legal hold
D. Preservation
Rate this question:
A. CPU cache, paging/swap files, RAM, remote logging data
B. RAM, CPU cache. Remote logging data, paging/swap files
C. Paging/swap files, CPU cache, RAM, remote logging data
D. CPU cache, RAM, paging/swap files, remote logging data
Rate this question:
A. AES
B. 3DES
C. RSA
D. MD5
Rate this question:
A. Rootkit
B. Ransomware
C. Trojan
D. Backdoor
Rate this question:
A. Separation of duties
B. Mandatory vacations
C. Background checks
D. Security awareness training
Rate this question:
A. The finding is a false positive and can be disregarded
B. The Struts module needs to be hardened on the server
C. The Apache software on the server needs to be patched and updated
D. The server has been compromised by malware and needs to be quarantined.
Rate this question:
A. Default configuration
B. End-of-life system
C. Weak cipher suite
D. Zero-day threats
Rate this question:
A. Enable screensaver locks when the phones are not in use to prevent unauthorized access
B. Configure the smart phones so that the stored data can be destroyed from a centralized location
C. Configure the smart phones so that all data is saved to removable media and kept separate from the device
D. Enable GPS tracking on all smart phones so that they can be quickly located and recovered
Rate this question:
A. Configure the mail server to require TLS connections for every email to ensure all transport data is encrypted
B. Create a user training program to identify the correct use of email and perform regular audits to ensure compliance
C. Implement a DLP solution on the email gateway to scan email and remove sensitive data or files
D. Classify all data according to its sensitivity and inform the users of data that is prohibited to share
Rate this question:
A. Credentialed scan.
B. Non-intrusive scan.
C. Privilege escalation test.
D. Passive scan.
Rate this question:
A. Enable IPSec and configure SMTP.
B. Enable SSH and LDAP credentials.
C. Enable MIME services and POP3.
D. Enable an SSL certificate for IMAP services.
Rate this question:
A. Apache
B. LSASS
C. MySQL
D. TFTP
Rate this question:
A. Authentication
B. HVAC
C. Full-disk encryption
D. File integrity checking
Rate this question:
A. Passwords are written on the bottom of a keyboard
B. Unpatched exploitable Internet-facing services
C. Unencrypted backup tapes
D. Misplaced hardware token
Rate this question:
A. Passive reconnaissance
B. Persistence
C. Escalation of privileges
D. Exploiting the switch
Rate this question:
A. The vulnerability scanner is performing an authenticated scan.
B. The vulnerability scanner is performing local file integrity checks.
C. The vulnerability scanner is performing in network sniffer mode.
D. The vulnerability scanner is performing banner grabbing.
A. Waterfall
B. Agile
C. Rapid
D. Extreme
Rate this question:
A. The segment should be placed on a separate VLAN, and the firewall rules should be configured to allow external traffic.
B. The segment should be placed in the existing internal VLAN to allow internal traffic only.
C. The segment should be placed on an intranet, and the firewall rules should be configured to allow external traffic.
D. The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.
Rate this question:
A. RC4
B. SHA-256
C. DES
D. AES
Rate this question:
A. Pre-shared key
B. Enterprise
C. Wi-Fi Protected setup
D. Captive portal
Rate this question:
A. Document and lock the workstations in a secure area to establish chain of custody
B. Notify the IT department that the workstations are to be reimaged and the data restored for reuse
C. Notify the IT department that the workstations may be reconnected to the network for the users to continue working
D. Document findings and processes in the after-action and lessons learned report
Rate this question:
A. Credential management
B. Group policy management
C. Acceptable use policy
D. Account expiration policy
Rate this question:
A. CCM
B. CBC
C. GCM
D. DSA
E. CFB
Rate this question:
A. Zero-day exploit
B. Remote code execution
C. Session hijacking
D. Command injection
Rate this question:
A. 192.168.0.16 255.25.255.248
B. 192.168.0.16/28
C. 192.168.1.50 255.255.25.240
D. 192.168.2.32/27
Rate this question:
A. Encrypt it with Joe's private key
B. Encrypt it with Joe's public key
C. Encrypt it with Ann's private key
D. Encrypt it with Ann's public key
Rate this question:
A. Removing the hard drive from its enclosure
B. Using software to repeatedly rewrite over the disk space
C. Using Blowfish encryption on the hard drives
D. Using magnetic fields to erase the data
Rate this question:
A. FTPS
B. SFTP
C. SSL
D. LDAPS
E. SSH
Rate this question:
A. Recovery
B. Identification
C. Preparation
D. Documentation
E. Escalation
Rate this question:
A. Create a daily encrypted backup of the relevant emails.
B. Configure the email server to delete the relevant emails.
C. Migrate the relevant emails into an "Archived" folder.
D. Implement automatic disk compression on email servers.
Rate this question:
Quiz Review Timeline (Updated): Jan 13, 2025 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.