Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

COMPTIA Security+ Exam Prep Test Bank 3 Latest with 400 Questions and Correct Answers/ CompTIA Security+ Practice Exam

Beoordeling
-
Verkocht
-
Pagina's
54
Cijfer
A+
Geüpload op
04-05-2026
Geschreven in
2025/2026

COMPTIA Security+ Exam Prep Test Bank 3 Latest with 400 Questions and Correct Answers/ CompTIA Security+ Practice Exam

Instelling
COMPTIA Security+
Vak
COMPTIA Security+

Voorbeeld van de inhoud

COMPTIA Security+ Exam Prep Test Bank 3
Latest 2026-2027 with 400 Questions and Correct
Answers/ CompTIA Security+ Practice Exam


According to CompTIA's Security+ examination blueprint, what are the three
listed reporting techniques for mitigation and deterrence? - ANSWER-alarms,
alerts, and trends


Which type of attack enables an intruder to capture and modify data traffic by
rerouting the traffic from a network device to the intruder's computer? -
ANSWER-network address hijacking


What are the three issues that symmetric data encryption fails to address? -
ANSWER-data integrity, repudiation, scalable key distribution


What occurs when a user provides a password or proof of identity to a system? -
ANSWER-authentication


Which wireless protocol provides the best security: WEP, WAP, WPA, or WPA2?
- ANSWER-Wi-Fi Protected Access IIversion 2 (WPA2) with CCMP


Which term is used when the amount of work that a computer has to do is divided
between two or more computers so that more work is performed in the same
amount of time? - ANSWER-load balancing


Which type of attack searches long lists of words for a particular language to
match them to an encrypted password? - ANSWER-dictionary attack

1

,What is spimming? - ANSWER-an instance of spam sent over an instant message
application


What is a proxy server? - ANSWER-a server that caches and filters content


Which type of authentication combines two or more authentication methods, like
something that a person knows (such as a password), something that a person owns
(such as a smart card), and a characteristic about the person (such as a fingerprint)?
- ANSWER-multi-factor authentication


Which services are usually provided by all-in-one security devices? - ANSWER-
URL filtering, content inspection, and malware inspection


Which directory protocol does Directory-Enabled Networking (DEN) use? -
ANSWER-Lightweight Directory Access Protocol (LDAP)


What is a honeypot? - ANSWER-a decoy system in your network installed to lure
potential intruders away from legitimate systems


What is the term for a potential opening in network security that a hacker can
exploit to attack a network? - ANSWER-a vulnerability


What is the most significant misuse of cookies? - ANSWER-misuse of personal
data


Which setting ensures that repeated attempts to guess a user's password is not
possible beyond the configured value? - ANSWER-account lockout


2

,What is a smurf attack? - ANSWER-an attack where a ping request is sent to a
broadcast network address with the aim of overwhelming the system


Is the Message Digest 5 (MD5) algorithm used with symmetric or asymmetric key
algorithms? - ANSWER-asymmetric


What is the purpose of Infrastructure as a Service (IaaS) in cloud computing? -
ANSWER-It provides computer and server infrastructure, typically through a
virtualization environment.


What is war driving? - ANSWER-the act of discovering unprotected wireless
network by driving around with a laptop


What does the acronym DAC denote? - ANSWER-discretionary access control


Which audit category will audit all instances of users exercising their rights? -
ANSWER-the Audit Privilege Use audit category


Which intrusion detection system (IDS) watches for intrusions that match a known
identity? - ANSWER-signature-based IDS


Which security protocol was designed as an interim solution to replace WEP
without requiring the replacement of legacy hardware? - ANSWER-Temporal Key
Integrity Protocol (TKIP)


What is the recommended action when the cost of the safeguard exceeds the
amount of the potential loss for a given risk? - ANSWER-to accept the risk




3

, What is a VPN concentrator? - ANSWER-a device that creates a virtual private
network (VPN)


Does each VLAN create its own collision domain or its own broadcast domain? -
ANSWER-broadcast domain


What is a warm site? - ANSWER-an alternate computing facility with
telecommunications equipment but no computers


What does the acronym POP denote? - ANSWER-Post Office Protocol


Which type of cryptography relies more on physics, rather than mathematics, as a
key aspect of its security model? - ANSWER-quantum cryptography


What is the main difference between an IDS and an IPS? - ANSWER-An IDS
detects intrusions. An IPS prevents intrusions.


What is the term for an authorized access that a network-based intrusion detection
system (NIDS) incorrectly detects as an attack? - ANSWER-false positive


What is another name for RAID 5? - ANSWER-disk striping with parity


What is the key size, in bits, of the Data Encryption Standard (DES)? - ANSWER-
56


What is another name for RAID 0? - ANSWER-disk striping




4

Geschreven voor

Instelling
COMPTIA Security+
Vak
COMPTIA Security+

Documentinformatie

Geüpload op
4 mei 2026
Aantal pagina's
54
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$23.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
muriithikelvin Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1520
Lid sinds
3 jaar
Aantal volgers
567
Documenten
3244
Laatst verkocht
1 dag geleden
GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS!

Feeling overwhelmed by exams? We’re here to help. Our study materials help you focus, build confidence, and walk into your exams ready. Compiled using real past exams, these resources give you valuable insight into the kinds of questions to expect and how to approach them — helping you maximize your scores and study smarter. Why Choose Us? Gold-rated seller. 1,250+ happy students. Trusted resources for healthcare and certification success. Friendly support whenever you need it.

Lees meer Lees minder
3.9

291 beoordelingen

5
147
4
54
3
41
2
16
1
33

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen