Comptia Security+ Questions

Comptia Security+ Questions

Professional Development

52 Qs

quiz-placeholder

Similar activities

HTML CSS JavaScript

HTML CSS JavaScript

Professional Development

56 Qs

Quizz Compition(Social Media,cyber Crime,Ms Word,Cyber Security)

Quizz Compition(Social Media,cyber Crime,Ms Word,Cyber Security)

Professional Development

50 Qs

GOOGLE FORM QUIZ TEST PAPER

GOOGLE FORM QUIZ TEST PAPER

Professional Development

50 Qs

RUTS Technology

RUTS Technology

9th Grade - Professional Development

50 Qs

DGI- QUIZ

DGI- QUIZ

Professional Development

50 Qs

PYTHON BE PYTHONING

PYTHON BE PYTHONING

Professional Development

50 Qs

M1 R5 ( Chapter 4)

M1 R5 ( Chapter 4)

Professional Development

50 Qs

Programación y robótica educativa (OpcMul)

Programación y robótica educativa (OpcMul)

Professional Development

50 Qs

Comptia Security+ Questions

Comptia Security+ Questions

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Harrison Palzewicz

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The board of directors at a company contracted with an insurance firm to limit the organization's liability. Which of the following risk management practices does this BEST describe?

Transference
Avoidance
Mitigation
Acknowledgement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic analyst needs to prove that data has not been tampered with since it was collected. Which of the following methods will the analyst MOST likely use?

Calculate the checksum using a hashing algorithm.
Look for tampering on the evidence collection bag.
Encrypt the collected data using asymmetric encryption.
Ensure proper procedures for chain of custody are being followed.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has tasked the security operations center with locating all web servers that respond to an unsecure protocol. Which of the following commands could an analyst run to find the requested servers?

nmap -p 80 10.10.10.0/24
nslookup 10.10.10.0
pathping 10.10.10.0 -p 80
ne -l -p 80

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk technician receives an email from the Chief Information Officer (CIO) asking for documents. The technician knows the CIO is on vacation for a few weeks. Which of the following should the technician do to validate the authenticity of the email?

Check the metadata in the email header of the received path in reverse order to follow the email's path.
Hover the mouse over the CIO's email address to verify the email address.
Look at the metadata in the email header and verify the ג€From:ג€ line matches the CIO's email address.
Forward the email to the CIO and ask if the CIO sent the email requesting the documents.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Chief Information Security Officer (CISO) requested a report on potential areas of improvement following a security incident. Which of the following incident response processes is the CISO requesting?

Lessons learned
Preparation
Detection
Containment

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following control types is focused primarily on reducing risk before an incident occurs?

Preventive
Deterrent
Corrective
Detective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cloud service provider has created an environment where customers can connect existing local networks to the cloud for additional computing resources and block internal HR applications from reaching the cloud. Which of the following cloud models is being used?

Hybrid
Public
Community
Private

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?