Search Header Logo

CompTIA Security+ Book Practice Test 4

Authored by blackpanther300 blackpanther300

Computers

12th Grade

Used 1+ times

CompTIA Security+ Book Practice Test 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Michelle wants to check for authentication failures on a CentOS Linux-based system. Where should she look for these event logs?

/var/log/auth.log

/var/log/fail

/var/log/events

/var/log/secure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following capabilities is not built into Autopsy?

Disk imaging

Timeline generation

Automatic image filtering

Communication visualization

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jessica wants to review the network traffic that her Windows system has sent to determine if a file containing sensitive data was uploaded from the system. What Windows log file can she use to find this information?

The application log

The network log

The security log

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Valerie wants to capture the pagefile from a Windows system. Where can she find the file for acquisition?

C:\Windows\swap

C:\pagefile.sys

C:\Windows\users\swap.sys

C:\swap\pagefile.sys

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common type of incident response exercise?

Drills

Simulations

Tabletop

Walk-throughs

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Nick is reviewing commands run on a Windows 10 system and discovers that the route command was run with the -p flag. What occurred?

Routes were discovered using a ping command.

The route's path will be displayed.

A route was added that will persist between boots.

A route was added that will use the path listed in the command.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What mitigation technique is used to limit the ability of an attack to continue while keeping systems and services online?

Segmentation

Isolation

Nuking

Containment

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?