CompTIA Security+ Exam Practice Questions (Free Quiz) Copy
Practice Exam Instructions
The exam comprises of the following types of questions;
Multiple Choice Single Response
Multiple Choice Multiple Response
There is no negative marking.
Attempt History: 0
Total Questions: 15
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
1 point(s)During the examination of the infected laptop, it is noticed that the malware loads on startup
and also loads a file called netutilities.dll every time MS Word is opened. This is an
example represents which of the following attack?CorrectIncorrect -
Question 2 of 15
2. Question
1 point(s)While testing a new application your group noted that when 3 or more of you click ‘submit’
at the same time on a particular form, the application crashes every time. This is an example
of which error?CorrectIncorrect -
Question 3 of 15
3. Question
1 point(s)High traffic load is crashing your e-commerce site. When you look at the traffic logs, you
identify that thousands of requests coming from hundreds of various IP addresses for the
same URL. You are facing which of the following attacks?CorrectIncorrect -
Question 4 of 15
4. Question
1 point(s)For what reason NAT will likely keep on being used in even IPv6 systems?
Why will NAT likely continue to be used even in IPv6 networks?CorrectIncorrect -
Question 5 of 15
5. Question
1 point(s)You are requested to suggest a VPN methodology to a senior management of your company
for newly purchased VPN concentrators. For what reason would you
firmly recommend IPSec VPNs?CorrectIncorrect -
Question 6 of 15
6. Question
1 point(s)Which of the following is not performed by a Secure Boot?
CorrectIncorrect -
Question 7 of 15
7. Question
1 point(s)Which statement is not true regarding systems on a chip?
CorrectIncorrect -
Question 8 of 15
8. Question
1 point(s)A person who works in the IT department of the bank informs you that the tellers are
permitted to access their terminal from 9 A.M. to 5 P.M., Monday through Saturday only.
This restriction is an example of which of the following?CorrectIncorrect -
Question 9 of 15
9. Question
1 point(s)Which one of the following passwords seems hardest to break?
CorrectIncorrect -
Question 10 of 15
10. Question
1 point(s)Which of the following policy describes what a company considers to be the proper use of
its resources (like computer policies, internet, network, and e-mail)?CorrectIncorrect -
Question 11 of 15
11. Question
1 point(s)From the following, which one is the best explanation of ‘Risk’?
CorrectIncorrect -
Question 12 of 15
12. Question
1 point(s)Which term describes the steps that a corporate performs after any unusual/abnormal
situation is seen in the operation of a computer system?CorrectIncorrect -
Question 13 of 15
13. Question
1 point(s)Which of the following is the reason behind digitally signed messages distinction from
encrypted messages?CorrectIncorrect -
Question 14 of 15
14. Question
1 point(s)A hash collision is bad for malware prevention. Why?
CorrectIncorrect -
Question 15 of 15
15. Question
1 point(s)Your boss demands you to examine the corporation’s internal PKI system’s CPS
for applicability and verification and to assure that it satisfies present demands. What are
you most likely to concentrate on?CorrectIncorrect