CompTIA Security+ Practice Test 3

CompTIA Security+ Quiz

1 / 20

A company wants to ensure that any modifications to critical system files are logged and can be traced back to a specific user. What tool should be used?

2 / 20

A network administrator needs to segment a network to improve security and prevent unauthorized access between different departments. What is the best solution?

3 / 20

A cybersecurity team is implementing a zero-trust architecture. What is a key principle of this security model?

4 / 20

A company wants to ensure that all employees' mobile devices comply with security policies before accessing corporate data. What solution should be implemented?

5 / 20

A security analyst is investigating an unauthorized login attempt outside of normal business hours. What is the best security control to prevent this?

6 / 20

A company wants to restrict access to its internal network so that only company-issued devices can connect. What security measure should be used?

7 / 20

A user reports that their computer is running slowly and displaying pop-up ads even when no browser is open. What is the most likely cause?

8 / 20

A security analyst needs to test an organization's security controls without prior knowledge of its infrastructure. What type of penetration test should be conducted?

9 / 20

An organization needs to ensure the confidentiality of sensitive customer records. What is the best way to achieve this?

10 / 20

A system administrator finds that a user has installed a keylogger on a shared company workstation. What type of threat is this?

11 / 20

A company wants to ensure that its wireless network is secured against unauthorized access. What is the best security protocol to use?

12 / 20

An attacker successfully tricks a user into clicking on a malicious link that downloads malware onto their system. What type of attack is this?

13 / 20

A network administrator is implementing port security to prevent unauthorized devices from connecting to the network. What security method should be used?

14 / 20

A company wants to prevent unauthorized access to data stored on company laptops, even if the devices are stolen. What security measure should be implemented?

15 / 20

An attacker gains access to an employee’s login session and hijacks their connection. What type of attack is this?

16 / 20

A security administrator wants to ensure that employees cannot install unauthorized software on their work computers. What is the best solution?

17 / 20

A security analyst needs to detect vulnerabilities on a company’s network before attackers can exploit them. What tool should be used?

18 / 20

An attacker sends an email appearing to be from a company's CEO, requesting a wire transfer. What type of attack is this?

19 / 20

A security team is reviewing user permissions and finds that some employees have administrative access they no longer need. What principle should be applied?

20 / 20

A cybersecurity analyst notices that employees are repeatedly using weak passwords despite security policies. What is the best way to enforce stronger passwords?

Your score is

The average score is 0%

0%