CompTIA Security Exam Questions

CompTIA Security Exam Questions

University

99 Qs

quiz-placeholder

Similar activities

CCNA Exam

CCNA Exam

University

100 Qs

*ИКТ*

*ИКТ*

University

100 Qs

Quiz Pra-UTS Manajement Jaringan

Quiz Pra-UTS Manajement Jaringan

University

100 Qs

LATIHAN SOAL KELAS XII TKJ 1 / XII TKJ2 SMK BINA MANDIRI

LATIHAN SOAL KELAS XII TKJ 1 / XII TKJ2 SMK BINA MANDIRI

University

100 Qs

22CA2015 - Mobile Hacking - Surprise Quiz II

22CA2015 - Mobile Hacking - Surprise Quiz II

University

98 Qs

CCNA Exam

CCNA Exam

University

95 Qs

CCNA Introduction to Networking

CCNA Introduction to Networking

University

95 Qs

CCNA

CCNA

University

100 Qs

CompTIA Security Exam Questions

CompTIA Security Exam Questions

Assessment

Quiz

Computers

University

Hard

Created by

Walter Consuegra

FREE Resource

99 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company implements a Zero Trust model to secure its infrastructure. What is the core principle of this model?

Implicit trust within the internal network

Continuous authentication and least privilege

Network segmentation with firewalls

Encrypting all data stored on-premises

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker exploits a weak API endpoint to access sensitive customer data. What is the best defense against such attacks?

Encrypt all API communications

Require multi-factor authentication for API users

Use input validation and rate limiting

Deploy endpoint protection on developer systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a Business Impact Analysis (BIA)?

Ensure compliance with regulatory frameworks

Identify critical business functions and assess the impact of disruptions

Detect insider threats through behavior monitoring

Analyze vulnerabilities in legacy systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a ransomware attack. The attackers demand payment to decrypt critical files. What should the incident response team prioritize?

Notify law enforcement and preserve evidence

Pay the ransom to restore operations quickly

Isolate affected systems and restore from backups

Disable all network traffic to contain the attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic technique ensures the integrity of a transmitted file?

Encryption

Hashing

Tokenization

Salting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends phishing emails targeting executives of an organization. What is this attack called?

Spear phishing

Whaling

Vishing

Smishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary function of a Security Information and Event Management (SIEM) system?

Encrypt sensitive files in real-time

Analyze and correlate security events across the network

Automatically patch vulnerable systems

Deploy firewalls and intrusion prevention systems

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?