CompTIA Security+

CompTIA Security+

University

32 Qs

quiz-placeholder

Similar activities

Security

Security

University

32 Qs

Introduction to Cryptography (Kolokfiumi II, Grupi 2, TE)

Introduction to Cryptography (Kolokfiumi II, Grupi 2, TE)

University

30 Qs

Introduction to Cryptography (Kolokfiumi II, Grupi 1, TE)

Introduction to Cryptography (Kolokfiumi II, Grupi 1, TE)

University

30 Qs

ISO27001

ISO27001

University

31 Qs

ICT THEORY PRACTICE

ICT THEORY PRACTICE

10th Grade - Professional Development

28 Qs

Software Engineering-Module I

Software Engineering-Module I

University

35 Qs

CHAPTER 1 - INTRODUCTION TO SOFTWARE

CHAPTER 1 - INTRODUCTION TO SOFTWARE

University

29 Qs

Security Plus CompTIA

Security Plus CompTIA

University

32 Qs

CompTIA Security+

CompTIA Security+

Assessment

Quiz

Computers

University

Hard

Created by

Thomas Martinez

FREE Resource

32 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be the most secure way to deploy a legacy application that requires a legacy operating system?

Stress testing

Sandboxing

Placing it on an encrypted drive

Dynamic testing

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements are true of input validation?

Requires a login with normal characters as input during testing

Helps to overcome buffer overflow and DoS attack

Includes sending any unexpected or maliciously crafted input to a system

Ensures that different types of input are handled gracefully by an application

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is more secure and checks the submitted data to ensure its validity?

Browser-side validation

Server-side validation

Client-side validation

Database-side validation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While inspecting your web application, you found that it is vulnerable to a SQL injection attack. Which of the following steps should you immediately take?

Put the web server on DMZ

Add input validation to forms

Install a host-based firewall on the web server

Apply security patch for the operating system on the web server

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following fully implements 802.11i security requirements?

WPA

WPA2

WEP

WPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of applying manual changes to a program called?

Patching

Replacement

Hotfix

Service pack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Brena, a security analyst, notices that external users are constantly reporting that a web application is slow and frequently times out when attempting to submit information. Which of the following software development best practices will she implement to prevent the issue?

Input validation

Fuzzing

Stress testing

Regression testing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?