Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CompTIA Security+ CE exam questions with verified answers

Beoordeling
-
Verkocht
-
Pagina's
41
Cijfer
A+
Geüpload op
03-05-2026
Geschreven in
2025/2026

CompTIA Security+ CE exam questions with verified answers

Instelling
CompTIA Certmaster CE Security+ Domain 1.0
Vak
CompTIA Certmaster CE Security+ Domain 1.0

Voorbeeld van de inhoud

CompTIA Security+ CE exam questions with
verified answers


Following a secure deployment methodology for custom
applications, early code testing would run in which type
of environment? - CORRECT ANSWERS ✔✔Development


Determine a solution that can combine with a cloud
access security broker (CASB) to provide a wholly cloud-
hosted platform for client access? - CORRECT ANSWERS
✔✔Next-generation secure web gateway


Consider the principles of web server hardening and
determine which actions a system administrator should
take when deploying a new server. (Select all that apply.)
- CORRECT ANSWERS ✔✔Establish a guest zone


Upload files using SSH


Use configuration templates


A user used an administrator account to download and
install a software application. After the user launched
the .exe extension installer file, the user experienced

,frequent crashes, slow computer performance, and
strange services running when turning on the computer.
What most likely happened to cause these issues? -
CORRECT ANSWERS ✔✔The user installed Trojan horse
malware.


A security operations center (SOC) analyst investigates
the propagation of a memory-resident virus across the
network and notices a rapid consumption of network
bandwidth, causing a Denial of Service (DoS). What type
of virus is this? - CORRECT ANSWERS ✔✔A worm


A user purchased a laptop from a local computer shop.
After powering on the laptop for the first time, the user
noticed a few programs like Norton Antivirus asking for
permission to install. How would an IT security specialist
classify these programs? - CORRECT ANSWERS ✔✔PUP
(potentially unwanted program)


A fileless malicious software can replicate between
processes in memory on a local host or over network
shares. What other behaviors and techniques would
classify malware as fileless rather than a normal virus?
(Select all that apply.) - CORRECT ANSWERS ✔✔-Uses
lightweight shellcode
-Uses low observable characteristic attacks

,An attacker is planning to setup a backdoor that will
infect a set of specific computers at an organization, to
inflict a set of other intrusion attacks remotely. Which of
the following will support the attackers' plan? (Select all
that apply.) - CORRECT ANSWERS ✔✔-Computer Bots,
-Command & Control


If a user's computer becomes infected with a botnet,
which of the following can this compromise allow the
attacker to do? (Select all that apply.) - CORRECT
ANSWERS ✔✔-Launch a Distributed Denial of Service
(DDoS) attack
-Establish a connection with a Command and Control
server
-Launch a mass-mail spam attack


If a user's device becomes infected with crypto-malware,
which of the following is the best way to mitigate this
compromise? - CORRECT ANSWERS ✔✔Have up-to-date
backups.


During an internal investigation, a security specialist
discovered a malicious backdoor script on a system
administrator's machine that executes if the admin's
account becomes disabled. What type of malware did the
specialist discover? - CORRECT ANSWERS ✔✔A logic
bomb

, End-users at an organization contact the cybersecurity
department. After downloading a file, they are being
redirected to shopping websites they did not intend to
navigate to, and built-in webcams turn on. The security
team confirms the issue as malicious, and notes modified
DNS (Domain Name System) queries that go to nefarious
websites hosting malware. What most likely happened to
the users' computers? - CORRECT ANSWERS
✔✔Spyware infected the computers.


An attacker installs Trojan malware that can execute
remote backdoor commands, such as the ability to upload
files and install software to a victim PC. What type of
Trojan malware is this? - CORRECT ANSWERS ✔✔A
Remote Access Trojan (RAT)


A hacker is trying to gain remote access to a company
computer by trying brute force password attacks using a
few common passwords in conjunction with multiple
usernames. What specific type of password attack is the
hacker most likely performing? - CORRECT ANSWERS
✔✔Password spraying attack


An attacker can exploit a weakness in a password
protocol to calculate the hash of a password. Which of the
following can the attacker match the hash to, as a means

Geschreven voor

Instelling
CompTIA Certmaster CE Security+ Domain 1.0
Vak
CompTIA Certmaster CE Security+ Domain 1.0

Documentinformatie

Geüpload op
3 mei 2026
Aantal pagina's
41
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$22.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMSTUDYPLUG Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
355
Lid sinds
3 jaar
Aantal volgers
107
Documenten
20448
Laatst verkocht
5 dagen geleden
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Lees meer Lees minder
4.5

238 beoordelingen

5
161
4
51
3
14
2
5
1
7

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen