CompTIA Security+ Practice Test 11

CompTIA Security+ Exam Practice Test

1 / 20

A cybersecurity analyst reviews adversary tactics, techniques, and procedures (TTPs) from MITRE ATT&CK and OSINT sources to predict potential threats against their company. Which cybersecurity practice are they performing?

2 / 20

A company's security team detects that a low-privileged user was able to execute admin-level commands using an unpatched vulnerability in a legacy application. Which mitigation strategy would best prevent this in the future?

3 / 20

A penetration tester gains physical access to a target server and installs a small device between the keyboard and USB port to secretly log all keystrokes. Which type of attack is this?

4 / 20

A hacker sets up a rogue access point named "Company_WiFi" near an office building. Employees unknowingly connect to it, allowing the hacker to intercept login credentials. Which attack is being performed?

5 / 20

A security analyst suspects an attacker has embedded malicious code within image files shared on a public forum. Which tool would best detect this activity?

6 / 20

A cybersecurity team proactively searches for threats within the network before an alert is triggered. Which strategy are they using?

7 / 20

A security analyst creates an exact bit-for-bit copy of a compromised hard drive for forensic analysis. Which process is being performed?

8 / 20

During a red team exercise, an attacker successfully gains initial access to a network but remains hidden for months while collecting information. Which phase of the Cyber Kill Chain is this?

9 / 20

A company requires that all contractors use a company-provided laptop with full-disk encryption before accessing sensitive systems. Which security control is being enforced?

10 / 20

A SIEM alerts the security team about high-volume outbound traffic from a single workstation. Which incident response phase should the team follow next?

11 / 20

A company implements passwordless authentication where users verify their identities using cryptographic key pairs stored on hardware tokens. Which authentication method is being used?

12 / 20

An attacker sends a specially crafted URL containing malicious JavaScript, which executes when viewed by an admin on a web-based management portal. What type of attack is this?

13 / 20

A security team identifies multiple unused services running on an exposed web server. Which security principle is being violated?

14 / 20

A company enforces strict USB policies, yet a user accidentally installs malware from a USB device that appeared to be a standard keyboard. Which attack technique was used?

15 / 20

An attacker gains access to a system and modifies the boot process to execute malware before the operating system loads. Which type of attack is being used?

16 / 20

A hacker captures multiple encrypted messages from a company’s wireless network and attempts to decrypt them by analyzing patterns in ciphertext. Which attack is being performed?

17 / 20

An employee with high-level access has been secretly collecting sensitive data over time and selling it to competitors. Which insider threat type best describes this situation?

18 / 20

A company moves sensitive applications to a cloud provider but wants full control over security configurations and OS-level access. Which cloud model should they choose?

19 / 20

A user reports being unable to access a system, even though their username and password are correct. The administrator finds that the account was locked due to excessive failed login attempts from different geographic locations. Which attack type is most likely responsible?

20 / 20

A security analyst notices encrypted traffic leaving the network at odd intervals to a known command-and-control (C2) server. Which technique is most likely being used by the attacker?

Your score is

The average score is 0%

0%