CompTIA Security+ 11-20

CompTIA Security+ 11-20

Professional Development

10 Qs

quiz-placeholder

Similar activities

SEC+ Ch.8 Review Test

SEC+ Ch.8 Review Test

Professional Development

15 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Scanning Networks

Scanning Networks

Professional Development

10 Qs

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

Security+ Lesson5

Security+ Lesson5

Professional Development

8 Qs

ICT05 - Day 2

ICT05 - Day 2

Professional Development

11 Qs

IT Support Quizz

IT Support Quizz

University - Professional Development

12 Qs

CompTIA Security+ 11-20

CompTIA Security+ 11-20

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Darien Booth

Used 151+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?

It allows a more in-depth analysis than other scan types.

It is limited to a particular operating system.

It impacts the hosts and network less than other scan types.

It includes the appropriate permissions for the different data types.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal when you passively test security controls?

Probing for weaknesses

Infiltrating the network

Interfering with business operations

Exploiting weaknesses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which memory vulnerability is associated with multithreaded applications?

Resource exhaustion

Race condition

DLL injection

Pointer dereferencing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often the weakest link in the security chain, and represents the largest vulnerability?

End-of-life systems

Untrained users

Lack of vendor support

Embedded systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of vulnerability is demonstrated by a SQL injection?

Default configuration

Improper input handling

Misconfiguration/weak configuration

Improper error handling

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?