Our team has conducted extensive research to compile a set of Comptia Security + Exam MCQs. We encourage you to test your Comptia Security + Exam knowledge by answering these 20 multiple-choice questions provided below.
Simply scroll down to begin!
A. Buffer overflow
B. Diffie-Hellman
C. TLS
D. Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
A. AC filtering - Disabled SSID broadcast
B. Business impact analysis
C. MAC filtering
D. IKE
A. Mandatory vacation
B. Mantrap
C. Hardware RAID 5 - Software RAID 1
D. Hot and cold aisles
A. War driving
B. Gas
C. Ensure a proper chain of custody
D. PEAP-TLS
A. MD5
B. WPA2
C. Least privilege
D. SYN attacks
A. EMI shielding
B. DMZ
C. Only the message data is encrypted
D. Dumpster diving - Shoulder surfing
A. Information disclosure
B. Before and after the imaging process and then hash the forensic image
C. Vulnerability scan
D. Vulnerability scanning
A. 25
B. Minimize risk of physical data theft. - Minimize the impact of the failure of any one file server.
C. Implicit deny
D. Mandatory vacations
A. Multi-factor authentication.
B. Asymmetric and Hashing
C. Load balancer
D. Firewall rulesflow of network traffic at the edge of the network
A. Escalation of privileges.
B. HSM
C. The new access point was mis-configured and is interfering with another nearby access point.
D. Fault tolerance
A. Man-in-the-middle
B. User rights and permissions reviews
C. Install a network-based IDS
D. Quantitative risk assessment
A. IDS
B. Symmetric
C. SSL
D. Fiber optic
A. NIPS is blocking activities from those specific websites.
B. Shoulder surfing
C. Only the message data is encrypted
D. A system that stops an attack in progress.
A. WPA Enterprise
B. Black hat
C. Mantraps
D. War driving
A. Privacy policy
B. Firewall rulesflow of network traffic at the edge of the network
C. Risk transference
D. Mandatory vacations
A. Security guard - Proximity reader
B. Validate input to remove hypertext
C. S/MIME PGP
D. IPSec
A. Ensure a proper chain of custody
B. Mitigation - acceptance - transference
C. Proxies
D. User rights
A. Integrity and Authentication
B. DAC
C. Se file servers attached to an NAS system.
D. MD5
A. Data Encryption Standard (DES)
B. Location that meets power and connectivity requirementsdatacenter
C. Clustering
D. Content inspection.
A. ICMP
B. MD5
C. MAC
D. MAC filtering
A. Off-site backup
B. TCP SYN flood attack
C. The web site's private key.
D. War driving
A. Video surveillance
B. Firewall rulesflow of network traffic at the edge of the network
C. A system that stops an attack in progress.
D. Chain of custody
A. Security guard - Proximity reader
B. Mandatory vacations
C. Fiber optic
D. Humidity
A. Implicit deny
B. Gas
C. Detective
D. Tailgating
A. Provide an appropriate ambient temperature and Maintain appropriate humidity levels
B. Forward to different RDP listening ports.
C. Ensure a proper chain of custody
D. Smurf attack
A. To minimize the organizational risk posed by users
B. Accountability
C. Segmentation of each wireless user from other wireless users
D. Use SSH to connect to the Linux shell
A. Loop protection
B. Tailgating
C. Signing of a user agreement.
D. Baseline reporting
A. Vishing
B. Content filtering
C. A system that stops an attack in progress.
D. Rogue access points
A. Chain of custody
B. The server is missing the default gateway.
C. Clustering
D. Phishing techniques