Comptia Security Questions
Comptia Security Questions
Mock Exam
SQL Injection
Command Injection
Directory Traversal
Submit
Submit
Submit
Non-disclosure Agreement
. Statement of Work
Submit
Video surveillance
Access badge
Bollards
Submit
Ransomware Attack
Network Scanning
Data Breach
Scheduled Maintenance
Submit
Score: 0.00 of null% Correct: 0 Incorrect: 0
Question 7: View Explanation
To prevent tailgating into a secure building, which of the following would be the most effective
solution?
Bollards
Video surveillance
Infrared sensors
Submit
Risk Mitigation
Risk Acceptance
Risk Avoidance
Risk Transfer
Submit
Ransomware
Logic bomb
Rootkit
Virus
Submit
VPN implementation
Submit
Submit
Geographic distribution
Submit
SQL injection
Score:Firmware
0.00 of null% Correct: 0 Incorrect: 0
Malicious update
Jailbreaking
Submit
Submit
Submit
Passwordless authentication
Supply chain
Mobile device
Zero-day
Firmware
Submit
Submit
Hashing
Symmetric encryption
Steganography
Asymmetric encryption
Submit
Score: 0.0020:
Question of null% Correct: 0 Incorrect: 0
View Explanation
To store customer data on a separate part of the network that is not accessible to users on the
main corporate network, the administrator should use:
Data Encryption
Network Segmentation
Submit
Submit
Patch Availability
Submit
Disposal/decommissioning
Monitoring/asset tracking
Assignment/accounting
Acquisition/procurement process
Submit
Data Encryption
Data Encryption
Submit
Corrective
Preventive
Compensating
Detective
Submit
Submit
Submit
Physical
Managerial
Technical
Operational
Submit
Insider Threat
Organized Crime
Submit
Geographic dispersion
Submit
Key stretching
Symmetric encryption
Data obfuscation
Digital signatures
Submit
Submit
Spoofing
Watering-hole
Vishing
Phishing
Submit
Removable Devices
Hard Drives
Submit
Submit
Key escrow
Submit
Submit
Novice hacker
Disclosure-driven individual
Activist hacker
Submit
Score: 0.0039:
Question of null% Correct: 0 Incorrect: 0
View Explanation
A bank requires all of its vendors to implement measures to prevent data loss on stolen
laptops. Which strategy is the bank demanding?
. Data obfuscation
Disk encryption
Information categorization
Submit
Jailbreaking
Submit
Submit
Integrity
Gap Analysis
Submit
Chain of Custody
Data Recovery
Incident Documentation
Forensic Analysis
Submit
Authentication
Authorization
Accounting
Non-repudiation
Submit
Submit
Hardening techniques
Monitoring
Configuration enforcement
Decommissioning
Submit
Data subject
Data processor
Data owner
Data custodian
Submit
Implementing a Firewall
Score: 0.00 of null% Submit
Correct: 0 Incorrect: 0
Mantrap Entryways
Biometric Scanners
Security Patrols
Visitor Logbooks
Keycard Access
Submit
Submit
File's metadata
Submit
Submit
Hardening targets
Submit
Score: 0.0055:
Question of null% Correct: 0 Incorrect: 0
View Explanation
A user finds a website that looks identical to their bank�s site, but the URL has a minor
spelling mistake. After entering their login details, the user realizes the website is fraudulent.
What kind of attack just occurred?
Brand impersonation
Pretexting
Phishing
Typosquatting
Submit
Purple Team
Submit
Operational Efficiency
Operational Efficiency
Submit
Score: 0.0058:
Question of null% Correct: 0 Incorrect: 0
View Explanation
healthcare provider needs to ensure that patient data is accessed only by authorized
personnel. What access control strategy should they prioritize?
Submit
Submit
Submit
Maintenance Windows
Stakeholder Consultation
Scheduled Downtime
Contingency Planning
Submit
Submit
Submit
Risk Avoidance
Risk Transfer
Risk Mitigation
Risk Acceptance
Submit
Firewall Configuration
Submit
Submit
Encryption at rest
Submit
Geolocation
Data at rest
Data in transit
Data sovereignty
Submit
Organized crime
Submit
Submit
Hashing
Data masking
Submit
Dependency checking
Dependency checking
Submit
Right-to-Audit Clause
Submit
Submit
Data Cataloging
Data Archiving
Data Reconciliation
Data Review
Submit
Score: 0.00 of null% Correct: 0 Incorrect: 0
Question 77: View Explanation
A fraudster contacts a company's finance department via email, pretending to be the Chief
Financial Officer, and urgently requests a wire transfer to an external account for a supposedly
confidential deal. Which of the following techniques is the fraudster using in this scenario?
Identity Fraud
Spear Phishing
Whaling
Fabrication
Submit