
CompTIA Security+ 11-20
Authored by Darien Booth
Computers
Professional Development
Used 153+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?
an application that identifies ports and services that are at risk on a network
an application that identifies ports and services that are at risk on a network
an application that identifies security issues on a network and gives suggestions on how to prevent the issues
an application that detects when network intrusions occur and identifies the appropriate personnel
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?
It allows a more in-depth analysis than other scan types.
It is limited to a particular operating system.
It impacts the hosts and network less than other scan types.
It includes the appropriate permissions for the different data types.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal when you passively test security controls?
Probing for weaknesses
Infiltrating the network
Interfering with business operations
Exploiting weaknesses
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is part of a scan to identify a common misconfiguration?
Packet sniffing
Dictionary attack
Password policy
Router with a default password
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which memory vulnerability is associated with multithreaded applications?
Resource exhaustion
Race condition
DLL injection
Pointer dereferencing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is often the weakest link in the security chain, and represents the largest vulnerability?
End-of-life systems
Untrained users
Lack of vendor support
Embedded systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of vulnerability is demonstrated by a SQL injection?
Default configuration
Improper input handling
Misconfiguration/weak configuration
Improper error handling
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
UDC 2022
Quiz
•
Professional Development
10 questions
Mastering KineMaster
Quiz
•
Professional Development
10 questions
Presentador EMAZE
Quiz
•
Professional Development
10 questions
Introducción a Excel
Quiz
•
Professional Development
11 questions
KOE034: Sensors and Instruments
Quiz
•
Professional Development
10 questions
Seguridad Informática
Quiz
•
5th Grade - Professio...
10 questions
Cloud computing 2
Quiz
•
Professional Development
10 questions
Maintain Files and Folders
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development