CompTIA Security+ 11-20

CompTIA Security+ 11-20

Professional Development

10 Qs

quiz-placeholder

Similar activities

Is Your AWS Cloud Well Architected

Is Your AWS Cloud Well Architected

Professional Development

10 Qs

Mitigation Techniques and Controls

Mitigation Techniques and Controls

Professional Development

10 Qs

CySA+ Tools

CySA+ Tools

Professional Development

12 Qs

Network+ OSI Model

Network+ OSI Model

Professional Development

11 Qs

cyberops12

cyberops12

Professional Development

10 Qs

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

Security+ Lesson5

Security+ Lesson5

Professional Development

8 Qs

ICT05 - Day 2

ICT05 - Day 2

Professional Development

11 Qs

CompTIA Security+ 11-20

CompTIA Security+ 11-20

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Darien Booth

Used 151+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?

It allows a more in-depth analysis than other scan types.

It is limited to a particular operating system.

It impacts the hosts and network less than other scan types.

It includes the appropriate permissions for the different data types.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal when you passively test security controls?

Probing for weaknesses

Infiltrating the network

Interfering with business operations

Exploiting weaknesses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which memory vulnerability is associated with multithreaded applications?

Resource exhaustion

Race condition

DLL injection

Pointer dereferencing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often the weakest link in the security chain, and represents the largest vulnerability?

End-of-life systems

Untrained users

Lack of vendor support

Embedded systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of vulnerability is demonstrated by a SQL injection?

Default configuration

Improper input handling

Misconfiguration/weak configuration

Improper error handling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?