CompTIA Security+ Quiz Questions and Answers

Are you ready to test your CompTIA Security+ knowledge? Our CompTIA Security+ Quiz contains 30 free practice questions that you can use to prepare for your final exam.
  • Question 1
  • Question 2
  • Question 3
  • Question 4
  • Question 5
  • Question 6
  • Question 7
  • Question 8
  • Question 9
  • Question 10
  • Question 11
  • Question 12
  • Question 13
  • Question 14
  • Question 15
  • Question 16
  • Question 17
  • Question 18
  • Question 19
  • Question 20
  • Question 21
  • Question 22
  • Question 23
  • Question 24
  • Question 25
  • Question 26
  • Question 27
  • Question 28
  • Question 29
  • Question 30
Question 1 ID: 458

A post it note with a password kept on sigh in a user’s cubicle is a violation of which policy?

A. Clean Desk Policy

B. Data Labelling Policy

C. User Account Policy

D. Acceptable Use Policy (AUP)

Answers

Question 2 ID: 437

What ensures the privacy of a VPN connection?

A. VPN Connector

B. VPN Concentrator

C. Load Balancer

D. Hardware Firewall

Answers

Question 3 ID: 439

What protocols do not provide authentication?

A. ICMP

B. SSH

C. IPv6

D. HPTT

Answers

Question 4 ID: 448

What port does Lightweight Directory Access Protocol (LDAP) run on?

A. 52

B. 40

C. 389

D. 695

Answers

Question 5 ID: 464

What software tool is used for monitoring and examining contents of the network traffic?

A. Port Scanner

B. Vulnerability Scanner

C. Protocol Analyzer

D. NetworkMiner

Answers

Question 6 ID: 441

What port does DNS run on?

A. 53

B. 230

C. 442

D. 52

Answers

Question 7 ID: 463

What acronym refers to a firewall controlling access to a web server?

A. WAF

B. DNS

C. MoR

D. WAP

Answers

Question 8 ID: 440

What refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?

A. Weak Passwords

B. Cryptovirology

C. Data Ownership

D. Embedded Geotag

Answers

Question 9 ID: 443

A fraudulent email requesting the recipient to reveal sensitive information such as username and password later used by a hacker for identity theft is known as:

A. Boot Virus

B. Macro Virus

C. File Infector

D. Logic Bomb

E. Phishing

F. Social Engineering

Answers

Question 10 ID: 461

What two factors are considered important for creating strong passwords?

A. Password Age

B. Password History

C. Password Length

D. Password Complexity

Answers

Question 11 ID: 452

What term relates closely to the concept of residual risk?

A. Virtualization

B. Risk Deterrence

C. Firewall Rules

D. Risk Acceptance

Answers

Question 12 ID: 446

Block ciphers work by encrypting each plaintext digit one at a time:

A. True

B. False

Answers

Question 13 ID: 445

What type of system can be compromised through phreaking?

A. ATX

B. Web Server

C. BIOS

D. PBX

Answers

Question 14 ID: 449

Which answers meets the requirement of multi-factor authentication?

A. Password & Biometric Scan

B. Fingerprint Scan

C. Username & Password

D. Identification Badge

Answers

Question 15 ID: 455

What is a security stance whereby a host is being granted/denied permissions based on its actions after it has been provided with the access to the network?

A. Quarantine

B. Network Separation

C. Post-Admission NAC

D. Pre-Admission NAC

Answers

Question 16 ID: 456

A concept of effective security posture employing multiple tools and different techniques to slow down an attacker known as:

A. Access Driving

B. Password Recovery

C. Layered Security

D. Vulnerability Scanning

E. Defense In Depth

Answers

Question 17 ID: 444

What is the practice of using a telephone system to manipulate the user into disclosing confidential information?

A. Pretexting

B. Baiting

C. Vishing

D. Tailgating

E. Whaling

Answers

Question 18 ID: 451

Which answer lists an example method for passive test of security controls?

A. Cross Site Script

B. Vulnerability Scan

C. Key Generator

D. Penetration Test

Answers

Question 19 ID: 436

What is allowing a connection through as firewall known as creating?

A. Tunnel

B. Access Point (AP)

C. Entry

D. Exception

Answers

Question 20 ID: 459

What is the function of archive bit?

A. Generates A Copy Of The File

B. Setting File Attribute To Read-Only

C. Indicates Whether A File Has Been Modified Since Last Backup

D. Search Indexing

Answers

Question 21 ID: 466

What action(s) can be taken by a passive Intrusion Detection System (IDS)?

A. Closing Down Connection

B. Terminating Process

C. Sending An Alert

D. Firewall Reconfiguration

E. Logging

Answers

Question 22 ID: 460

Which answer(s) list the characteristic features of the Mandatory Access Control (MAC) model?

A. Access To Resources Based On User Identity

B. Users Are Not Allowed To Change Access Policies At Their Own Discretion

C. Every Resource Has A Sensitivity Label Matching A Clearance Level Assigned To A User

D. Labels And Clearance Levels Can Only Be Applied And Changed By An Administrator

Answers

Question 23 ID: 447

Copies of lost private encryption keys can be retrieved from a key database by:

A. Backup Operators

B. Recovery Agents

C. Power Users

D. End Users

Answers

Question 24 ID: 462

Which password is the most secure and complex?

A.19$s7@2Rb0y@

B. C65108XjwDE

C. GO1Y7C6DXM

D.k3Qdo3tk66l!

Answers

Question 25 ID: 438

What is the SCP protocol used for?

A. Secure File Transfer

B. Network Addressing

C. Sending Email Messages

D. Directory Access

Answers

Question 26 ID: 450

A path or tool allowing an attacker to gain unauthorized access to a system or network is known as:

A. Rootkit

B. Nmap

C. Threat Vector

D. ClickJack

Answers

Question 27 ID: 454

What is a solution that allows you to make phone calls over a broadband Internet connection instead of typical analog telephone lines?

A. Web Server

B. VoIP

C. IPv6

D. DNS

Answers

Question 28 ID: 457

What is an example order of volatility for a typical computer system?

A. Archival Media, Disk Files, Temporary Files, Memory Dump

B. Memory Dump, Disk Files, Temporary Files, Archival Media

C. Temporary Files, Memory Dump, Archival Media, Disk Files

D. Memory Dump, Temporary Files, Disk Files, Archival Media

Answers

Question 29 ID: 442

Which of the following answers apply to a smurf attack?

A. IP Spoofing & DDoS

B. MITM Attack & Vulcanbot

C. Polymorphic Malware & Memory Resident virus

D. Overwrite Virus & Trojan

Answers

Question 30 ID: 453

What functionality allows a DLP system to fulfil its role?

A. Content Inspection

B. Loop Protection

C. Environmental Monitoring

D. Loop Detection

Answers