Comptia Security+ Questions

Comptia Security+ Questions

Professional Development

52 Qs

quiz-placeholder

Similar activities

Robotic Process Automation by Chayan Bhattacharjee

Robotic Process Automation by Chayan Bhattacharjee

Professional Development

50 Qs

Savio Quarantine Trivia Challenge #2

Savio Quarantine Trivia Challenge #2

KG - Professional Development

50 Qs

ICT Quiz-Fun-Trivia

ICT Quiz-Fun-Trivia

Professional Development

50 Qs

Az-900 Prep 2

Az-900 Prep 2

Professional Development

50 Qs

ULANGAN NILAI RAPOT KELAS XII

ULANGAN NILAI RAPOT KELAS XII

Professional Development

50 Qs

KUIS PKK 2 (PERAKITAN PRODUK)

KUIS PKK 2 (PERAKITAN PRODUK)

KG - Professional Development

50 Qs

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Kiểm tra giữa kỳ TIN HỌC lớp 6_THCS Nguyễn Trãi_01_21-22

Professional Development

50 Qs

Położenie i granice Polski, przeszłość, góry i zlodowacenia

Położenie i granice Polski, przeszłość, góry i zlodowacenia

7th Grade - Professional Development

47 Qs

Comptia Security+ Questions

Comptia Security+ Questions

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Harrison Palzewicz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The board of directors at a company contracted with an insurance firm to limit the organization's liability. Which of the following risk management practices does this BEST describe?

Transference
Avoidance
Mitigation
Acknowledgement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?

Calculate the checksum using a hashing algorithm.
Look for tampering on the evidence collection bag.
Encrypt the collected data using asymmetric encryption.
Ensure proper procedures for chain of custody are being followed.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?

nmap -p 80 10.10.10.0/24
nslookup 10.10.10.0
pathping 10.10.10.0 -p 80
ne -l -p 80

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk technician receives an email from the Chief Information Officer (CIO) asking for documents. The technician knows the CIO is on vacation for a few weeks. Which of the following should the technician do to validate the authenticity of the email?

Check the metadata in the email header of the received path in reverse order to follow the email's path.
Hover the mouse over the CIO's email address to verify the email address.
Look at the metadata in the email header and verify the ג€From:ג€ line matches the CIO's email address.
Forward the email to the CIO and ask if the CIO sent the email requesting the documents.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?

Lessons learned
Preparation
Detection
Containment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following control types is focused primarily on reducing risk before an incident occurs?

Preventive
Deterrent
Corrective
Detective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

Hybrid
Public
Community
Private

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?