CompTIA Security+ Practice Test 4

CompTIA Security+ Quiz

1 / 20

A company wants to protect its internal network from direct exposure to the internet while allowing controlled access to public-facing servers. What network configuration should be used?

2 / 20

A hacker sends a fraudulent text message claiming to be from a user's bank, asking for account credentials. What type of attack is this?

3 / 20

A company wants to reduce the risk of data being stolen by employees using USB drives. What security measure should be implemented?

4 / 20

A network administrator needs to ensure that a web application only allows encrypted traffic. What should be implemented?

5 / 20

An attacker sends a specially crafted request to a web application, attempting to execute unauthorized SQL commands. What type of attack is this?

6 / 20

A malicious user hides malware inside a seemingly legitimate program, tricking users into installing it. What type of malware is this?

7 / 20

A company enforces a policy that requires employees to change their passwords every 90 days. What security concern does this address?

8 / 20

A security administrator wants to restrict access to critical servers based on users’ job roles. What type of access control should be implemented?

9 / 20

A user reports that their computer is running unusually slow and frequently redirects them to unfamiliar websites. What is the most likely cause?

10 / 20

A cybersecurity team is implementing a disaster recovery plan. What should be their top priority?

11 / 20

A company is concerned about unauthorized access to its data stored in the cloud. What security control should be implemented?

12 / 20

A security administrator discovers that a user has been granted higher access privileges than necessary for their job role. What security concept has been violated?

13 / 20

A security team needs to monitor a company’s network for suspicious activity in real time. What solution should they use?

14 / 20

A user connects a personal USB drive to a corporate workstation, causing a malware infection. What security measure could prevent this?

15 / 20

A company is implementing a new security policy requiring all users to authenticate with a PIN and a fingerprint scan. What type of authentication is this?

16 / 20

An employee reports that they received an email warning about suspicious activity on their bank account, urging them to click a link to verify their identity. What type of attack is this?

17 / 20

A security analyst detects an abnormal number of login attempts from multiple IP addresses targeting a single user account. What is the best mitigation technique?

18 / 20

A company wants to ensure that an application’s source code is free from security vulnerabilities before deploying it. What should they perform?

19 / 20

A hacker modifies the ARP cache on a local network to intercept data meant for another device. What type of attack is this?

20 / 20

A security administrator wants to ensure that users do not reuse old passwords. What security control should be implemented?

Your score is

The average score is 0%

0%