CompTIA Security+ Practice Exam 2

CompTIA Security+ Practice Exam 2

University

37 Qs

quiz-placeholder

Similar activities

FE-Practice # 1

FE-Practice # 1

12th Grade - University

40 Qs

System Monitoring Tools Quiz

System Monitoring Tools Quiz

12th Grade - University

40 Qs

CompTIA Security Plus

CompTIA Security Plus

University

37 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Chapter10-Routing

Chapter10-Routing

University

38 Qs

IAS CH1 QUIZ

IAS CH1 QUIZ

University

35 Qs

CompTIA Security+ Practice Test 1

CompTIA Security+ Practice Test 1

University

32 Qs

CompTIA Security+ Practice Exam 2

CompTIA Security+ Practice Exam 2

Assessment

Quiz

Computers

University

Medium

Created by

Kyle Atkins

Used 18+ times

FREE Resource

37 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An invalid input is intentionally entered in an application to check if the application can handle it. Which type of testing is performed?

Stress

User acceptance

Fuzzing

Regression

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true of input validation?


Each correct answer represents a complete solution. Choose three.

Helps to overcome buffer overflow and DoS attack

Includes sending any unexpected or maliciously crafted input to a system

Ensures that different types of input are handled gracefully by an application

Requires a user login with normal characters as input during testing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fully implements the 802.11i security requirements?

WPS

WPA

WPA2

WEP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A directory protocol that includes all the information about a network is a/an:

SIP protocol

LDAP protocol

SNMP protocol

RADIUS protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has developed an application which is undergoing the testing process. According to the results of the testing process, some changes have been made to the application. The company now wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should the company perform?

Manual peer review

User acceptance

Regression

Stress

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true about asymmetric encryption?


Each correct answer represents a complete solution. Choose two.

It is faster as compared to symmetric encryption

Only one key is needed to encrypt and decrypt data in it

In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message

It uses a public key and private key for data encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following password attacks calculates all the possible hashes for a set of characters and stores them in a table?

Brute force

Hybrid

Dictionary

Rainbow

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?