Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ Level 2 – Intermediate Practice Exam

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
06-05-2026
Written in
2025/2026

This intermediate-level practice exam bridges foundational security knowledge and advanced technical skills. Designed for candidates who have completed Security+ Level 1 or have 6–12 months of IT security experience, this 40-question assessment covers: identity and access management (IAM), PKI and cryptographic protocols, network security controls (firewalls, IDS/IPS, VPNs), endpoint protection, incident response procedures, vulnerability scanning, business continuity, and risk assessment frameworks. Includes multiple-choice, short answer, and scenario-based questions with a full answer key. Pass mark: 70%. Perfect for Security+ exam candidates, IT administrators, SOC analysts, and security professionals preparing for certification or role advancement.

Show more Read less
Institution
Course

Content preview

CompTIA Security+ (SY0-701)
Level 2 – Intermediate (Exam 2)
Time allowed: 1 hour
Total marks: 40
Pass mark: 26 (65%)

Instructions: Answer all questions. Write your answers in the spaces provided. Marks are
shown in brackets [ ] at the end of each question.



Section A: Multiple Choice (10 marks)
Circle the correct answer.

1. Which of the following symmetric encryption algorithms is currently considered the most
secure and widely used?
A) DES
B) 3DES
C) AES
D) RSA
[1 mark]

2. A security analyst sees multiple failed login attempts from a single IP address over a short
period. This is most likely:
A) A DDoS attack
B) A brute force attack
C) A man-in-the-middle attack
D) SQL injection
[1 mark]

3. Which technology allows an organisation to securely extend its internal network across the
internet?
A) Firewall
B) IDS
C) VPN (Virtual Private Network)
D) Proxy server
[1 mark]

4. What is the primary purpose of a Digital Signature?
A) To encrypt a message
B) To provide integrity and non-repudiation
C) To compress large files

, D) To hide the contents of a message
[1 mark]

5. Which of the following is an example of defence in depth?
A) Using only a firewall
B) Relying solely on antivirus software
C) Combining a firewall, IDS, antivirus, and security awareness training
D) Using a single, very strong password
[1 mark]

6. Which protocol provides encrypted remote access to a server's command line?
A) Telnet
B) FTP
C) SSH (Secure Shell)
D) HTTP
[1 mark]

7. A man-in-the-middle (MITM) attack can be prevented by using:
A) Strong passwords
B) Antivirus software
C) TLS (Transport Layer Security) / HTTPS
D) A firewall
[1 mark]

8. Which of the following is a cryptographic hash function?
A) AES
B) RSA
C) SHA-256
D) ECC
[1 mark]

9. What is the purpose of a SIEM (Security Information and Event Management) system?
A) To block malicious traffic
B) To centrally collect, analyse, and correlate security logs
C) To encrypt sensitive email
D) To manage user passwords
[1 mark]

10. An organisation wants to ensure that sensitive data is not copied to a USB drive. Which
control should they use?
A) DLP (Data Loss Prevention)
B) IDS
C) VPN
D) HIDS
[1 mark]

Connected book

Written for

Course

Document information

Uploaded on
May 6, 2026
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$4.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
vickysymo

Get to know the seller

Seller avatar
vickysymo Western Governors University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 day
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions