CompTIA Security+ Practice Test 2

CompTIA Security+ Practice Test 2

12th Grade

14 Qs

quiz-placeholder

Similar activities

BTEC Level 2 Technology Systems W1-4

BTEC Level 2 Technology Systems W1-4

11th - 12th Grade

15 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

T Level Support 5.2 IoT

T Level Support 5.2 IoT

12th Grade

15 Qs

Mobile Security

Mobile Security

9th - 12th Grade

14 Qs

Mobile Devices

Mobile Devices

9th - 12th Grade

14 Qs

1.1.6 Embedded Systems

1.1.6 Embedded Systems

1st Grade - University

10 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Client-server and peer to peer networks

Client-server and peer to peer networks

10th - 12th Grade

13 Qs

CompTIA Security+ Practice Test 2

CompTIA Security+ Practice Test 2

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Naquai Roundtree

Used 10+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber group is reviewing its web filtering capabilities after a recent breach. Which centralized web-filtering technique groups websites into categories such as social networking, gambling, and webmail?

Block rules

Uniform resource locators (URL) scanning

Reputation-based filtering

Content categorization

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

After a long day of malicious software removal, the team is ready to head home but knows their day is not over. They did not want to come in to find another vulnerability exploited, so they split themselves into three teams to perform the final testing. What three types of testing are they performing? (Select the three best options.)

Auditing

Verification

Prioritization

Re-scanning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network administrator at a large tech company has the task of enhancing the visibility into network traffic patterns in a distributed enterprise network. The administrator wants to implement a solution that captures metadata and statistics about network traffic without recording each frame, with the goal of improving the company’s security measures. Which tool should the administrator consider implementing?

A vulnerable scanner

A NetFlow collector

A data loss prevention (DLP)

a simple network management protocol (SNMP) trap

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A tech consultant enhances automation and scripting with continuous integration and testing capabilities. What are some characteristics associated with this capability? (Select the three best options.)

Different software systems are enabled to communicate and interact, creating seamless workflows.

Developers regularly merge their changes back to the main code branch.

The technician makes improvements to code quality and accelerates development cycles.

The system automatically evaluates merges to help detect and fix integration issues

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A technician creates a report on end-user activity to see what events the host's security software monitors instead of the operating system (OS). What type of log provides these data points?

OS-specific security logs

Application logs

Endpoint logs

Firewall logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A mid-sized organization has faced a series of breaches due to insecure authentication methods. The security team concludes that current practices for user credentials need revision. What is the BEST course of action?

Enhance recognition of phishing attempts

Implement password management

Start a development phase

Start an initial phase

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity team plans to launch awareness programs to educate employees about potential security threats. They are in the process of defining objectives, selecting tools, and outlining the scope of the programs. What phase of the process should they initiate?

Password management

User guidance and training

Campaigns

Initial Phase

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?