Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Security+ CertMaster exam questions with answers

Rating
-
Sold
-
Pages
80
Grade
A+
Uploaded on
03-05-2026
Written in
2025/2026

Security+ CertMaster exam questions with answers

Institution
CompTIA Certmaster CE Security+ Domain 1.0
Course
CompTIA Certmaster CE Security+ Domain 1.0

Content preview

Security+ CertMaster exam questions with |\ |\ |\ |\ |\




answers


Which security related phrase relates to the integrity of
|\ |\ |\ |\ |\ |\ |\ |\ |\



data? - CORRECT ANSWERS ✔✔Modification
|\ |\ |\ |\




An engineer looks to implement security measures by
|\ |\ |\ |\ |\ |\ |\ |\



following the five functions in the National Institute of
|\ |\ |\ |\ |\ |\ |\ |\ |\



Standards and Technology (NIST) Cybersecurity |\ |\ |\ |\ |\



Framework. When documenting the "detect" function, |\ |\ |\ |\ |\ |\



what does the engineer focus on? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\



✔✔Ongoing proactive monitoring |\ |\




Any external responsibility for an organization's security
|\ |\ |\ |\ |\ |\ |\



lies mainly with which individuals? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\



✔✔The owner |\




How might the goals of basic network management not
|\ |\ |\ |\ |\ |\ |\ |\ |\



be well-aligned with the goals of security? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\



ANSWERS ✔✔Management focuses on availability over |\ |\ |\ |\ |\ |\



confidentiality.


The National Institute of Standards and Technology (NIST)
|\ |\ |\ |\ |\ |\ |\ |\



provides a framework that classifies security-related
|\ |\ |\ |\ |\ |\

,functions. Which description aligns with the "respond" |\ |\ |\ |\ |\ |\ |\



function? - CORRECT ANSWERS ✔✔Identify, analyze, and|\ |\ |\ |\ |\ |\ |\



eradicate threats. |\




A company has an annual contract with an outside firm to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



perform a security audit on their network. The purpose of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



the annual audit is to determine if the company is in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



compliance with their internal directives and policies for |\ |\ |\ |\ |\ |\ |\ |\



security control. Select the broad class of security control
|\ |\ |\ |\ |\ |\ |\ |\ |\



that accurately demonstrates the purpose of the audit. -
|\ |\ |\ |\ |\ |\ |\ |\ |\



CORRECT ANSWERS ✔✔Managerial |\ |\




The _____ requires federal agencies to develop security
|\ |\ |\ |\ |\ |\ |\ |\



policies for computer systems that process confidential
|\ |\ |\ |\ |\ |\ |\



information. - CORRECT ANSWERS ✔✔Computer Security |\ |\ |\ |\ |\ |\



Act


After a poorly handled security breach, a company
|\ |\ |\ |\ |\ |\ |\ |\



updates its security policy to include an improved
|\ |\ |\ |\ |\ |\ |\ |\



incident response plan. Which of the following security
|\ |\ |\ |\ |\ |\ |\ |\



controls does this update address? - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\



✔✔Corrective


The IT department head returns from an industry
|\ |\ |\ |\ |\ |\ |\ |\



conference feeling inspired by a presentation on the topic |\ |\ |\ |\ |\ |\ |\ |\



of cybersecurity frameworks. A meeting is scheduled with
|\ |\ |\ |\ |\ |\ |\ |\



IT staff to brainstorm ideas for deploying security controls
|\ |\ |\ |\ |\ |\ |\ |\ |\

,by category and function throughout the organization.
|\ |\ |\ |\ |\ |\ |\ |\



Which of the following ideas are consistent with industry
|\ |\ |\ |\ |\ |\ |\ |\ |\



definitions? (Select all that apply.) - CORRECT ANSWERS |\ |\ |\ |\ |\ |\ |\ |\



✔✔Deploy a technical control to enforce network access |\ |\ |\ |\ |\ |\ |\ |\



policies.


Schedule quarterly security awareness workshops as a
|\ |\ |\ |\ |\ |\ |\



preventive control to mitigate social engineering attacks. |\ |\ |\ |\ |\ |\




Deploy agents to file servers to perform continuous
|\ |\ |\ |\ |\ |\ |\ |\



backups to cloud storage as a corrective control to
|\ |\ |\ |\ |\ |\ |\ |\ |\



mitigate the impact of malware. |\ |\ |\ |\




Which of the following has a cyber security framework
|\ |\ |\ |\ |\ |\ |\ |\ |\



(CSF) that focuses exclusively on IT security, rather than
|\ |\ |\ |\ |\ |\ |\ |\ |\



IT service provisioning? - CORRECT ANSWERS ✔✔National
|\ |\ |\ |\ |\ |\



Institute of Standards and Technology (NIST)
|\ |\ |\ |\ |\ |\




When exploring the deep web, a user will need which of
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



the following to find a specific and hidden dark web site? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



CORRECT ANSWERS ✔✔A specific URL
|\ |\ |\ |\ |\




A company technician goes on vacation. While the
|\ |\ |\ |\ |\ |\ |\ |\



technician is away, a critical patch released for Windows
|\ |\ |\ |\ |\ |\ |\ |\ |\



servers is not applied. According to the National Institute
|\ |\ |\ |\ |\ |\ |\ |\ |\



of Standards and Technology (NIST), what does the delay
|\ |\ |\ |\ |\ |\ |\ |\ |\

, in applying the patch create on the server? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



ANSWERS ✔✔Vulnerability |\




Which of the following is mostly considered an insider
|\ |\ |\ |\ |\ |\ |\ |\ |\



threat? (Select all that apply.) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\



✔✔Former employee |\




Contractor


One aspect of threat modeling is to identify potential
|\ |\ |\ |\ |\ |\ |\ |\ |\



threat actors and the risks associated with each one.
|\ |\ |\ |\ |\ |\ |\ |\ |\



When assessing the risk that any one type of threat actor
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



poses to an organization, what are the critical factors to
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



profile? (Select all that apply.) - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\



✔✔Intent
Motivation


A user with authorized access to systems in a software
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



development firm installs a seemingly harmless, yet |\ |\ |\ |\ |\ |\ |\



unauthorized program on a workstation without the IT |\ |\ |\ |\ |\ |\ |\ |\



department's sanction. Identify the type of threat that is a |\ |\ |\ |\ |\ |\ |\ |\ |\



result of this user's action. - CORRECT ANSWERS
|\ |\ |\ |\ |\ |\ |\ |\ |\



✔✔Unintentional insider threat |\ |\




A contractor has been hired to conduct security
|\ |\ |\ |\ |\ |\ |\ |\



reconnaissance on a company. The contractor browses |\ |\ |\ |\ |\ |\ |\



the company's website to identify employees and then
|\ |\ |\ |\ |\ |\ |\ |\

Written for

Institution
CompTIA Certmaster CE Security+ Domain 1.0
Course
CompTIA Certmaster CE Security+ Domain 1.0

Document information

Uploaded on
May 3, 2026
Number of pages
80
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$26.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
Follow You need to be logged in order to follow users or courses
Sold
354
Member since
3 year
Number of followers
107
Documents
20427
Last sold
1 week ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

238 reviews

5
161
4
51
3
14
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions