CompTIA Security+ Practice Test 8

CompTIA Security+ Quiz

1 / 20

A security analyst is investigating unusual outbound traffic from a workstation. The system is sending encrypted data to an unknown IP. What is the most likely cause?

2 / 20

A company is using role-based access control (RBAC). How does this improve security?

3 / 20

An attacker exploits a software vulnerability that the vendor has not yet patched. What type of attack is this?

4 / 20

A cybersecurity team is implementing a SIEM system. What is its primary purpose?

5 / 20

Which security measure can help protect against insider threats?

6 / 20

A user receives an email from their bank requesting urgent verification of their account details. What should they do?

7 / 20

A cybersecurity analyst is investigating a brute-force attack against a company's web application. What security measure can help mitigate this type of attack?

8 / 20

A company wants to secure remote access for employees working from home. What is the best solution?

9 / 20

An attacker successfully injects malicious SQL queries into a website’s login form. What type of attack has occurred?

10 / 20

A security analyst discovers an open port that allows unauthorized remote access to a server. What should be done first?

11 / 20

A hacker intercepts unencrypted login credentials sent over a public Wi-Fi network. What type of attack is this?

12 / 20

A company needs to securely store passwords to prevent unauthorized access. Which hashing algorithm is most suitable?

13 / 20

A user reports that their computer is displaying pop-ups and redirecting them to suspicious websites. What is the most likely cause?

14 / 20

A security engineer is tasked with securing access to the company database by ensuring only authorized applications can communicate with it. What should be implemented?

15 / 20

A cybersecurity team is implementing a system that will require users to verify their identity using both a password and a fingerprint. What type of authentication is this?

16 / 20

A security administrator notices an unknown device connected to the internal network. What is the best action to take first?

17 / 20

An organization wants to prevent ex-employees from accessing corporate cloud applications. What is the best approach?

18 / 20

A security analyst is reviewing logs and notices multiple failed login attempts on an administrator account occurring at regular intervals from different IP addresses. What type of attack is taking place?

19 / 20

A user reports that their system is running slowly and that unknown processes are using a high amount of CPU and memory. Upon further investigation, the security team finds that the computer is part of a botnet. What type of malware is most likely responsible?

20 / 20

A company has detected unauthorized access to its internal network. Upon investigation, the security team finds that an employee’s credentials were stolen and used to log in from an unusual geographic location. What security measure would have best prevented this?

Your score is

The average score is 0%

0%