CompTIA Security+ Practice Test 9

CompTIA Security+ Quiz

1 / 20

A company wants to ensure that employees cannot reuse their previous five passwords. What security control enforces this?

2 / 20

A security analyst is investigating an alert where multiple failed authentication attempts occurred within seconds from different locations. What is the most likely cause?

3 / 20

A company needs to protect customer data stored in a cloud database from unauthorized access. What is the best approach?

4 / 20

An organization enforces policies that require employees to use a smart card and a PIN for authentication. What type of security mechanism is this?

5 / 20

A hacker successfully exploits an outdated version of a web server’s software before a patch is available. What type of attack is this?

6 / 20

A security engineer needs to establish a secure connection for remote access to a corporate network. What protocol should be used?

7 / 20

A cybersecurity team is securing an email server by ensuring that all outgoing emails are digitally signed. Which technology should be used?

8 / 20

A security team needs to ensure that all system logs are synchronized and use a standardized timestamp. What protocol should they implement?

9 / 20

A company wants to prevent employees from sending confidential files outside the organization via email or USB storage. What solution should be implemented?

10 / 20

An attacker captures data packets on a wireless network and later replays them to gain access to an authenticated session. What attack is being performed?

11 / 20

A security analyst detects an increase in network traffic to a single server, causing slowdowns. The traffic originates from multiple sources worldwide. What type of attack is likely occurring?

12 / 20

A hacker exploits a buffer overflow vulnerability in a software application to gain administrative privileges. What type of attack is this?

13 / 20

A company's web application is vulnerable to attackers injecting JavaScript into form fields, which executes when other users visit the page. What type of attack is this?

14 / 20

A security engineer is tasked with encrypting an entire hard drive to prevent data theft in case of device loss. What should be used?

15 / 20

A user receives an email that appears to be from their IT department asking them to reset their password via an unfamiliar link. What type of attack is this?

16 / 20

A cybersecurity team is setting up an intrusion prevention system (IPS) to block malicious traffic. Where should this device be placed in the network?

17 / 20

An attacker successfully alters the DNS settings of a corporate website, redirecting users to a fake login page. What type of attack has occurred?

18 / 20

A security administrator is implementing 802.1X authentication on network switches. What is the primary purpose of this configuration?

19 / 20

A company wants to ensure that only employees using company-issued devices can access sensitive corporate applications. Which security measure should be implemented?

20 / 20

A security analyst notices that multiple employee accounts have been locked due to excessive failed login attempts. What is the most likely type of attack?

Your score is

The average score is 0%

0%