CompTIA Security+ Practice Test 5

CompTIA Security+ Quiz

1 / 20

A security team needs to identify weaknesses in an organization’s network before attackers can exploit them. What should be performed?

2 / 20

A company wants to ensure that its employees follow security best practices when working remotely. What should be enforced?

3 / 20

A security analyst is investigating a ransomware attack. What is the primary characteristic of this type of attack?

4 / 20

A network administrator needs to separate internal network traffic from guest Wi-Fi traffic. What should be implemented?

5 / 20

A company wants to ensure that only authorized devices can communicate on its Wi-Fi network. What technology should be implemented?

6 / 20

A company's security team wants to protect against social engineering attacks. What is the best way to achieve this?

7 / 20

A security administrator wants to prevent users from installing unauthorized applications on company devices. What is the best approach?

8 / 20

A company wants to ensure that all employees’ devices are encrypted before allowing them to access corporate data remotely. What should be implemented?

9 / 20

A hacker successfully installs a rootkit on a victim’s machine. What is the main risk of this attack?

10 / 20

A company's security team wants to ensure that system logs cannot be modified by attackers. What is the best solution?

11 / 20

An attacker exploits an unpatched software vulnerability before a fix is available. What type of attack is this?

12 / 20

A company wants to ensure that deleted data from old hard drives cannot be recovered. What is the best method?

13 / 20

An administrator wants to ensure that any external devices connecting to the network meet security policies before gaining access. What solution should be used?

14 / 20

A security analyst needs to detect and prevent sensitive data from leaving the organization through email. What security solution should be used?

15 / 20

An attacker sends a fraudulent email appearing to be from an IT administrator, requesting login credentials. What type of attack is this?

16 / 20

A user reports receiving multiple pop-ups and unusual redirects while browsing the internet. What is the most likely cause?

17 / 20

A system administrator needs to ensure that critical files are not modified or deleted. What security measure should be implemented?

18 / 20

A hacker compromises a website and embeds malicious scripts that execute when users visit the site. What type of attack is this?

19 / 20

A company's web application is being targeted by automated bots attempting to guess user credentials. What security measure should be implemented?

20 / 20

A security administrator notices that employees are using the same password across multiple systems. What is the best solution to mitigate this risk?

Your score is

The average score is 0%

0%