CompTIA Security+ Practice Test 7

CompTIA Security+ Quiz

1 / 20

A security team needs to analyze a suspicious file without risking infection. What is the best approach?

2 / 20

A system administrator is implementing file encryption to protect data at rest on company laptops. Which technology should be used?

3 / 20

A security analyst needs to encrypt email communications to ensure message confidentiality. Which protocol should be used?

4 / 20

Which of the following is an example of a technical security control?

5 / 20

What is the function of a security information and event management (SIEM) system?

6 / 20

Which of the following is a primary characteristic of a distributed denial-of-service (DDoS) attack?

7 / 20

In risk management, what does the term "residual risk" mean?

8 / 20

What is the main advantage of using multifactor authentication (MFA)?

9 / 20

Which security model focuses on preventing conflicts of interest by restricting access based on user roles and data classifications?

10 / 20

What is the purpose of a digital signature?

11 / 20

Which of the following protocols is commonly used to securely manage network devices over an unsecured network?

12 / 20

What does the term "zero-day vulnerability" refer to?

13 / 20

Which of the following is an example of a physical security control?

14 / 20

What is the primary goal of implementing a public key infrastructure (PKI)?

15 / 20

In the context of cybersecurity, what does the term "phishing" refer to?

16 / 20

Which type of malware is designed to replicate itself and spread to other systems without user intervention?

17 / 20

What is the main function of a network firewall?

18 / 20

Which of the following best describes the principle of least privilege?

19 / 20

What is the primary purpose of a demilitarized zone (DMZ) in network architecture?

20 / 20

Which of the following is a symmetric encryption algorithm?

Your score is

The average score is 0%

0%