CompTIA Security+ Practice Test 1

CompTIA Security+ Quiz

1 / 30

An attacker posing as an IT help desk employee calls an organization’s receptionist and convinces them to reset an executive's password. What type of attack is this?

2 / 30

Your company’s website is suddenly overwhelmed with traffic, making it inaccessible. Further investigation shows a massive number of requests coming from different IP addresses. Which attack is occurring?

3 / 30

Which of the following cryptographic algorithms is asymmetric and used for key exchange?

4 / 30

Which risk response strategy involves shifting the risk to a third party, such as purchasing cybersecurity insurance?

5 / 30

Which wireless encryption protocol is most secure and should be used whenever possible?

6 / 30

Which of the following multi-factor authentication (MFA) combinations provides the strongest security?

7 / 30

An attacker is injecting SQL commands into a web application’s input fields to access the underlying database. Which security control is most effective at preventing this attack?

8 / 30

A high-level executive receives an email that appears to be from the company's IT department, requesting login credentials to "resolve an urgent security issue." What type of attack is this?

9 / 30

A user reports that their system is running unusually slow, and an analysis reveals the presence of a malware variant that modifies system files and spreads through local network shares. Which type of malware is this?

10 / 30

Your network has recently been exposed to malicious software. The incident response team has contained and eradicated the malware. What is the next step in the response process?

11 / 30

A security analyst notices multiple failed login attempts on a company’s web portal from different IP addresses worldwide. What type of attack is most likely occurring?

12 / 30

A company wants to ensure that employees cannot copy sensitive company data to USB drives. What security measure should be implemented?

13 / 30

A cybersecurity team is implementing a security information and event management (SIEM) system. What is the primary purpose of a SIEM?

14 / 30

A user receives an email that appears to be from their bank asking them to update their account details via a provided link. What type of attack is this?

15 / 30

A security administrator needs to enforce multi-factor authentication (MFA) for remote access. Which combination provides the strongest security?

16 / 30

A company uses role-based access control (RBAC). What principle does this model follow?

17 / 30

A network administrator detects unusual outbound traffic from a server, with large amounts of data being sent to an external IP address. What is the most likely explanation?

18 / 30

An organization wants to prevent attackers from discovering the details of their internal network. Which practice can help achieve this?

19 / 30

A company is implementing a disaster recovery plan (DRP). What is the primary goal of a DRP?

20 / 30

A penetration tester successfully gains access to a system by exploiting a vulnerability that was unknown to the software vendor. What type of attack was performed?

21 / 30

A company wants to encrypt sensitive emails so that only the intended recipient can read them. What technology should be used?

22 / 30

A security administrator needs to ensure that files cannot be modified without proper authorization. What security principle does this address?

23 / 30

A security analyst is reviewing logs and notices multiple login attempts from an unknown country outside of business hours. What security measure can prevent unauthorized access in this scenario?

24 / 30

A company wants to reduce the attack surface of its web application. Which action would be most effective?

25 / 30

An attacker intercepts communications between a user and a website, modifying the data in transit. What type of attack is this?

26 / 30

A system administrator is configuring a security policy to enforce password complexity. Which requirement would improve security the most?

27 / 30

A company needs to store sensitive customer data securely in a cloud environment. What is the best practice?

28 / 30

A security engineer wants to prevent SQL injection attacks on a web application. What is the best defense?

29 / 30

A cybersecurity team is implementing an incident response plan. What is the first step in handling a security incident?

30 / 30

A company requires employees to use a fingerprint scan before accessing sensitive company data. What type of authentication is this?

Your score is

The average score is 83%

0%