CompTIA Security+ Practice Test 14

CompTIA Security+ Exam Practice Test

1 / 20

A company wants to block the execution of unauthorized applications, including malware. Which security control should they use?

2 / 20

An anomaly detection system alerts that an employee’s workstation is sending large amounts of encoded data in DNS queries. Which attack is likely happening?

3 / 20

Which security mechanism can prevent attackers from using stolen hashed passwords to authenticate?

4 / 20

A company uses a content delivery network (CDN) to absorb traffic spikes during a large-scale DDoS attack. What type of mitigation is being used?

5 / 20

A DevOps team uses containers for deployment, but security finds that containers share the same kernel, leading to privilege escalation risks. Which security control should be enforced?

6 / 20

An attacker overwrites memory beyond a buffer’s boundary, allowing arbitrary code execution. What security measure can mitigate this?

7 / 20

To prevent an attacker from forging digital signatures, a security team should ensure that their cryptographic system has which property?

8 / 20

A company wants to prevent IoT devices from communicating directly with critical business systems. Which security measure should they implement?

9 / 20

A company’s DNS security solution redirects all requests to known malicious domains to a safe, controlled environment instead. What is this technique called?

10 / 20

A banking Trojan injects malicious scripts into a user's browser session, modifying transactions before they are sent to the bank. What is this attack called?

11 / 20

An attacker captures NTLM authentication requests on the network and forwards them to a target server to gain unauthorized access. Which attack is this?

12 / 20

An attacker discovers that a company’s API allows requests without requiring authentication, exposing sensitive customer data. Which security flaw is present?

13 / 20

A company uses RFID-based access control cards for entry. An attacker uses a portable RFID skimmer near an employee’s badge and later reproduces the signal to gain unauthorized access. What is this attack?

14 / 20

An attacker wants their malware to survive reboots. They configure it to execute at startup by modifying the Windows Run registry key. Which persistence method was used?

15 / 20

A penetration tester observes that a web application assigns sequential session IDs to users upon login. Which type of attack could be used to exploit this flaw?

16 / 20

An attacker exploits a weakness in Bluetooth pairing to send unsolicited messages and files to nearby devices. What is this attack called?

17 / 20

An attacker requests a service ticket for a high-privilege service account and then extracts its encrypted password hash for offline cracking. Which attack is this?

18 / 20

A user reports that even after removing a suspected virus, it keeps coming back after every reboot. Analysis shows that the malware loads before the operating system. Which type of malware is this?

19 / 20

An attacker intercepts a connection negotiation process between a client and a server and forces them to use a weaker encryption algorithm that the attacker can easily break. Which attack is this?

20 / 20

An attacker places a malicious DLL with the same name as a legitimate one in a directory that is searched first by a vulnerable application. When the application runs, it loads the attacker’s DLL instead of the legitimate one. Which attack technique is being used?

Your score is

The average score is 0%

0%