Search Header Logo

CompTIA Security+ Practice Exam 2

Authored by Kyle Atkins

Computers

University

Used 18+ times

CompTIA Security+ Practice Exam 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An invalid input is intentionally entered in an application to check if the application can handle it. Which type of testing is performed?

Stress

User acceptance

Fuzzing

Regression

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true of input validation?


Each correct answer represents a complete solution. Choose three.

Helps to overcome buffer overflow and DoS attack

Includes sending any unexpected or maliciously crafted input to a system

Ensures that different types of input are handled gracefully by an application

Requires a user login with normal characters as input during testing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fully implements the 802.11i security requirements?

WPS

WPA

WPA2

WEP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A directory protocol that includes all the information about a network is a/an:

SIP protocol

LDAP protocol

SNMP protocol

RADIUS protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has developed an application which is undergoing the testing process. According to the results of the testing process, some changes have been made to the application. The company now wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should the company perform?

Manual peer review

User acceptance

Regression

Stress

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true about asymmetric encryption?


Each correct answer represents a complete solution. Choose two.

It is faster as compared to symmetric encryption

Only one key is needed to encrypt and decrypt data in it

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message

It uses a public key and private key for data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following password attacks calculates all the possible hashes for a set of characters and stores them in a table?

Brute force

Hybrid

Dictionary

Rainbow

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?