CompTIA Security+ Practice Test 2

CompTIA Security+ Quiz

1 / 27

A hacker uses a program that rapidly tries thousands of possible password combinations to gain access to a system. What type of attack is this?

2 / 27

An attacker intercepts and alters communications between two parties without them knowing. Which type of attack is this?

3 / 27

Which of the following best describes a zero-day attack?

4 / 27

Which access control model is most appropriate for military and government environments where strict classification levels are enforced?

5 / 27

A firewall administrator wants to block all inbound SSH traffic while allowing all outbound web traffic. Which ports should be blocked and allowed?

6 / 27

A disgruntled employee with administrator privileges is suspected of deleting critical company files before resigning. Which security measure would have minimized this risk?

7 / 27

A company moves its web applications to a cloud provider but wants to retain control over data encryption and access management. Which cloud model is most suitable?

8 / 27

A security analyst discovers that an attacker has modified DNS records to redirect users from a legitimate banking website to a malicious one. What type of attack is this?

9 / 27

A company is implementing a security policy requiring employees to use an app that generates a one-time code for login in addition to their passwords. What type of authentication is being used?

10 / 27

A security administrator finds that an attacker has exploited an input field on a web application to execute unauthorized scripts in users' browsers. What type of attack is this?

11 / 27

A user reports receiving an email with an attached invoice file. After opening it, their system became unresponsive, and files were renamed with a ".locked" extension. What is the most likely cause?

12 / 27

A security team wants to enforce policies ensuring that employees use strong, unique passwords for each system they access. Which security control would best help?

13 / 27

A cybersecurity analyst detects multiple unsuccessful login attempts on a user account in a short period. What security mechanism can prevent this type of attack?

14 / 27

An attacker intercepts unencrypted login credentials transmitted over an open Wi-Fi network. What attack method was likely used?

15 / 27

A company uses a cloud provider for data storage but wants to ensure they can retrieve data in case of a provider outage. Which security principle applies?

16 / 27

A cybersecurity team is performing a risk assessment. What should they do first?

17 / 27

A new security policy requires employees to encrypt sensitive emails before sending them. What protocol should be used to ensure email encryption?

18 / 27

A company wants to ensure that employees can only access systems and files necessary for their job roles. What principle should be enforced?

19 / 27

An organization wants to protect against zero-day vulnerabilities. Which security measure would be most effective?

20 / 27

A hacker gains access to a company’s network and installs software that provides continued access, even after credentials are changed. What type of malware is being used?

21 / 27

A company needs to monitor and log network activity to detect unusual behavior. What tool should be used?

22 / 27

A security team is configuring a web server to ensure only encrypted connections are used. What protocol should they enforce?

23 / 27

A user clicks on a fake software update pop-up and unknowingly installs a keylogger. What type of attack is this?

24 / 27

A security administrator needs to block users from accessing certain websites on the company network. What technology should be used?

25 / 27

A company wants to ensure that if a server fails, another server can immediately take over without downtime. What solution should be implemented?

26 / 27

A security team is investigating a potential security breach. What process should they follow first?

27 / 27

A company requires that employees use a fingerprint scan and a password to access secure areas. What authentication method is being used?

Your score is

The average score is 0%

0%