CompTIA Security+ Practice Test 6

CompTIA Security+ Quiz

1 / 20

A security administrator notices a high number of failed login attempts on a server from a single IP address. What is the most likely explanation?

2 / 20

A security team wants to verify that company software applications do not contain security flaws before deployment. What should they perform?

3 / 20

An attacker successfully gains access to an internal corporate network but cannot move laterally. What security measure likely prevented this?

4 / 20

A web application stores sensitive customer information in plaintext within a database. What is the best way to secure this data?

5 / 20

A company requires employees to use unique, complex passwords that change every 90 days. What security concept does this support?

6 / 20

A hacker intercepts an encrypted email but cannot decrypt its contents. What security principle is being enforced?

7 / 20

A company's security policy requires that any system changes be reviewed and approved before deployment. What security principle is this?

8 / 20

A penetration tester successfully retrieves password hashes from a compromised server. What is the next likely step an attacker would take?

9 / 20

Correct Answer: Vulnerability scanner
Explanation: A vulnerability scanner identifies security weaknesses and known exploits in systems.

10 / 20

A cybersecurity team needs to verify whether an organization's servers are vulnerable to known exploits. What tool should they use?

11 / 20

A user receives an email stating their bank account has been compromised and needs immediate verification via a link. What type of attack is this?

12 / 20

A financial institution requires employees to use smart cards and PINs for authentication. What type of authentication is being used?

13 / 20

An attacker gains access to a company's internal network and intercepts unencrypted email communications. What type of attack is this?

14 / 20

A company is implementing a honeypot on its network. What is the primary purpose of this device?

15 / 20

A security analyst detects an unusual increase in outbound network traffic. What type of attack might this indicate?

16 / 20

A security administrator wants to prevent employees from sending sensitive information via email. What solution should be implemented?

17 / 20

A company requires employees to use biometric authentication before accessing sensitive data. What security concept is being implemented?

18 / 20

An attacker uses a fake access point with the same SSID as a legitimate network to trick users into connecting. What is this attack called?

19 / 20

A cybersecurity team needs to securely transfer logs from multiple remote locations to a central server. What protocol should they use?

20 / 20

A network administrator notices unauthorized devices connecting to the corporate Wi-Fi. What is the best way to prevent this?

Your score is

The average score is 0%

0%