CompTIA Security+ Practice Test 33

CompTIA Security+ Exam Practice Test

1 / 10

A marketing firm’s employee downloads a free tool from an unverified site. Soon after, files are encrypted with a “.locked” extension, and a ransom note appears. What occurred, and what should the IT team do FIRST?

2 / 10

A bank processes credit card transactions online. During an audit, regulators demand proof of compliance with a standard requiring encryption and access controls. Which standard applies, and what should the bank demonstrate?

3 / 10

A security analyst at a law firm notices a workstation sending 10,000 ICMP echo requests to an external server in one minute, disrupting network performance. What is happening, and what should be done FIRST?

4 / 10

A retail website crashes after a customer submits a form with unusual characters (e.g., ‘ OR 1=1 --), exposing database records. What vulnerability was exploited, and what should the developer fix FIRST?

5 / 10

A remote team accesses a corporate CRM system via RDP. Recently, logs show brute-force attempts on port 3389 from external IPs. What should the IT admin implement to secure these connections without disrupting access?

6 / 10

A software vendor releases a critical update with a hash value posted on their site. After downloading, a security analyst notices the file’s hash doesn’t match. What is the MOST likely issue, and what should be done NEXT?

7 / 10

A healthcare provider is designing a new patient portal hosted in the cloud. The portal must comply with strict privacy laws and protect sensitive data from breaches. Which architecture should the IT team adopt to ensure data security during processing?

8 / 10

During a routine audit, a manufacturing firm discovers an employee’s workstation has been sending encrypted packets to an external IP for weeks. Antivirus scans show no threats, but the system has hidden processes. What is the MOST likely cause, and what should be investigated?

9 / 10

An e-commerce company’s server logs show a sudden spike in resource usage overnight, with no scheduled tasks or user activity. A process named “xmrig” is running, consuming 90% of CPU. What is the MOST likely issue, and what should be done FIRST?

10 / 10

A financial firm’s HR manager receives an email marked “urgent” from what appears to be the CEO’s address, requesting employee payroll data. The email domain is slightly misspelled (e.g., ceo@compnay.com instead of ceo@company.com), and it urges immediate action. What is the MOST likely threat, and what should the manager do FIRST?

Your score is

The average score is 90%

0%