
CompTIA Security+ Practice Exam 2
Authored by Kyle Atkins
Computers
University
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
37 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
An invalid input is intentionally entered in an application to check if the application can handle it. Which type of testing is performed?
Stress
User acceptance
Fuzzing
Regression
2.
MULTIPLE SELECT QUESTION
30 sec ⢠1 pt
Which of the following statements are true of input validation?
Each correct answer represents a complete solution. Choose three.
Helps to overcome buffer overflow and DoS attack
Includes sending any unexpected or maliciously crafted input to a system
Ensures that different types of input are handled gracefully by an application
Requires a user login with normal characters as input during testing
3.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
Which of the following fully implements the 802.11i security requirements?
WPS
WPA
WPA2
WEP
4.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
A directory protocol that includes all the information about a network is a/an:
SIP protocol
LDAP protocol
SNMP protocol
RADIUS protocol
5.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
A company has developed an application which is undergoing the testing process. According to the results of the testing process, some changes have been made to the application. The company now wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should the company perform?
Manual peer review
User acceptance
Regression
Stress
6.
MULTIPLE SELECT QUESTION
30 sec ⢠1 pt
Which of the following statements are true about asymmetric encryption?
Each correct answer represents a complete solution. Choose two.
It is faster as compared to symmetric encryption
Only one key is needed to encrypt and decrypt data in it
In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message
It uses a public key and private key for data encryption
7.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
Which of the following password attacks calculates all the possible hashes for a set of characters and stores them in a table?
Brute force
Hybrid
Dictionary
Rainbow
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
32 questions
Java Basico
Quiz
ā¢
University
39 questions
Karel Programming
Quiz
ā¢
10th Grade - University
40 questions
CSM with Visca
Quiz
ā¢
University
40 questions
Desain Grafis 2021
Quiz
ā¢
University
35 questions
QUIZ PEMROGRAMAN 1 REG. PAGI
Quiz
ā¢
University
40 questions
Evaluación de MS word
Quiz
ā¢
University
40 questions
FE-Practice # 1
Quiz
ā¢
12th Grade - University
40 questions
IOT_SARS
Quiz
ā¢
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
ā¢
3rd Grade
20 questions
Equivalent Fractions
Quiz
ā¢
3rd Grade
25 questions
Multiplication Facts
Quiz
ā¢
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
ā¢
4th Grade
22 questions
fractions
Quiz
ā¢
3rd Grade
20 questions
Main Idea and Details
Quiz
ā¢
5th Grade
20 questions
Context Clues
Quiz
ā¢
6th Grade
15 questions
Equivalent Fractions
Quiz
ā¢
4th Grade