Search Header Logo

CompTIA Security Exam Questions

Authored by Walter Consuegra

Computers

University

CompTIA Security Exam Questions
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

99 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company implements a Zero Trust model to secure its infrastructure. What is the core principle of this model?

Implicit trust within the internal network

Continuous authentication and least privilege

Network segmentation with firewalls

Encrypting all data stored on-premises

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker exploits a weak API endpoint to access sensitive customer data. What is the best defense against such attacks?

Encrypt all API communications

Require multi-factor authentication for API users

Use input validation and rate limiting

Deploy endpoint protection on developer systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a Business Impact Analysis (BIA)?

Ensure compliance with regulatory frameworks

Identify critical business functions and assess the impact of disruptions

Detect insider threats through behavior monitoring

Analyze vulnerabilities in legacy systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a ransomware attack. The attackers demand payment to decrypt critical files. What should the incident response team prioritize?

Notify law enforcement and preserve evidence

Pay the ransom to restore operations quickly

Isolate affected systems and restore from backups

Disable all network traffic to contain the attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cryptographic technique ensures the integrity of a transmitted file?

Encryption

Hashing

Tokenization

Salting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker sends phishing emails targeting executives of an organization. What is this attack called?

Spear phishing

Whaling

Vishing

Smishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary function of a Security Information and Event Management (SIEM) system?

Encrypt sensitive files in real-time

Analyze and correlate security events across the network

Automatically patch vulnerable systems

Deploy firewalls and intrusion prevention systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?