
CompTIA Security Exam Questions
Authored by Walter Consuegra
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
99 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company implements a Zero Trust model to secure its infrastructure. What is the core principle of this model?
Implicit trust within the internal network
Continuous authentication and least privilege
Network segmentation with firewalls
Encrypting all data stored on-premises
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker exploits a weak API endpoint to access sensitive customer data. What is the best defense against such attacks?
Encrypt all API communications
Require multi-factor authentication for API users
Use input validation and rate limiting
Deploy endpoint protection on developer systems
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary purpose of a Business Impact Analysis (BIA)?
Ensure compliance with regulatory frameworks
Identify critical business functions and assess the impact of disruptions
Detect insider threats through behavior monitoring
Analyze vulnerabilities in legacy systems
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company experiences a ransomware attack. The attackers demand payment to decrypt critical files. What should the incident response team prioritize?
Notify law enforcement and preserve evidence
Pay the ransom to restore operations quickly
Isolate affected systems and restore from backups
Disable all network traffic to contain the attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which cryptographic technique ensures the integrity of a transmitted file?
Encryption
Hashing
Tokenization
Salting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker sends phishing emails targeting executives of an organization. What is this attack called?
Spear phishing
Whaling
Vishing
Smishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a primary function of a Security Information and Event Management (SIEM) system?
Encrypt sensitive files in real-time
Analyze and correlate security events across the network
Automatically patch vulnerable systems
Deploy firewalls and intrusion prevention systems
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?