CompTIA Security+ Practice Test 2

CompTIA Security+ Practice Test 2

12th Grade

14 Qs

quiz-placeholder

Similar activities

TestOut ITF Chapter 10

TestOut ITF Chapter 10

CompTIA Review #2

CompTIA Review #2

Sec+ review

Sec+ review

PEN TEST

PEN TEST

Sec Review 5

Sec Review 5

Sec Review 3

Sec Review 3

CompTIA Security+ Practice Test 2

CompTIA Security+ Practice Test 2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Naquai Roundtree

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail?

Block rules

Uniform resource locators (URL) scanning

Reputation-based filtering

Content categorization

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

After a long day of malicious software removal, the team is ready to head home but knows their day is not over. They did not want to come in to find another vulnerability exploited, so they split themselves into three teams to perform the final testing. What three types of testing are they performing? (Select the three best options.)

Auditing

Verification

Prioritization

Re-scanning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator at a large tech company has the task of enhancing the visibility into network traffic patterns in a distributed enterprise network. The administrator wants to implement a solution that captures metadata and statistics about network traffic without recording each frame, with the goal of improving the company’s security measures. Which tool should the administrator consider implementing?

A vulnerable scanner

A NetFlow collector

A data loss prevention (DLP)

a simple network management protocol (SNMP) trap

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A tech consultant enhances automation and scripting with continuous integration and testing capabilities. What are some characteristics associated with this capability? (Select the three best options.)

Different software systems are enabled to communicate and interact, creating seamless workflows.

Developers regularly merge their changes back to the main code branch.

The technician makes improvements to code quality and accelerates development cycles.

The system automatically evaluates merges to help detect and fix integration issues

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician creates a report on end-user activity to see what events the host's security software monitors instead of the operating system (OS). What type of log provides these data points?

OS-specific security logs

Application logs

Endpoint logs

Firewall logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A mid-sized organization has faced a series of breaches due to insecure authentication methods. The security team concludes that current practices for user credentials need revision. What is the BEST course of action?

Enhance recognition of phishing attempts

Implement password management

Start a development phase

Start an initial phase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity team plans to launch awareness programs to educate employees about potential security threats. They are in the process of defining objectives, selecting tools, and outlining the scope of the programs. What phase of the process should they initiate?

Password management

User guidance and training

Campaigns

Initial Phase

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?