Search Header Logo

CompTIA Security+ 11-20

Authored by Darien Booth

Computers

Professional Development

Used 153+ times

CompTIA Security+ 11-20
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?

It allows a more in-depth analysis than other scan types.

It is limited to a particular operating system.

It impacts the hosts and network less than other scan types.

It includes the appropriate permissions for the different data types.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal when you passively test security controls?

Probing for weaknesses

Infiltrating the network

Interfering with business operations

Exploiting weaknesses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which memory vulnerability is associated with multithreaded applications?

Resource exhaustion

Race condition

DLL injection

Pointer dereferencing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often the weakest link in the security chain, and represents the largest vulnerability?

End-of-life systems

Untrained users

Lack of vendor support

Embedded systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of vulnerability is demonstrated by a SQL injection?

Default configuration

Improper input handling

Misconfiguration/weak configuration

Improper error handling

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?