CompTIA Security+ 11-20

CompTIA Security+ 11-20

Professional Development

10 Qs

quiz-placeholder

Similar activities

ITF - Information Technology - Quiz 1.1

ITF - Information Technology - Quiz 1.1

Professional Development

10 Qs

Mitigation Techniques and Controls

Mitigation Techniques and Controls

Professional Development

10 Qs

Quiz Printer Epson

Quiz Printer Epson

Professional Development

10 Qs

Is Your AWS Cloud Well Architected

Is Your AWS Cloud Well Architected

Professional Development

10 Qs

Pretest CCNA

Pretest CCNA

Professional Development

10 Qs

Client-Side Network Configuration Quiz

Client-Side Network Configuration Quiz

Professional Development

12 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Professional Development

15 Qs

 Review ITNS 2 part 2

Review ITNS 2 part 2

9th Grade - Professional Development

13 Qs

CompTIA Security+ 11-20

CompTIA Security+ 11-20

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Darien Booth

Used 151+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You have been authorized by management to use a vulnerability scanner once every three months. What is this tool?

an application that identifies ports and services that are at risk on a network

an application that identifies ports and services that are at risk on a network

an application that identifies security issues on a network and gives suggestions on how to prevent the issues

an application that detects when network intrusions occur and identifies the appropriate personnel

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

As part of your company's comprehensive vulnerability scanning policy, you decide to perform a passive vulnerability scan on one of your company's subnetworks. Which statement is true of this scan?

It allows a more in-depth analysis than other scan types.

It is limited to a particular operating system.

It impacts the hosts and network less than other scan types.

It includes the appropriate permissions for the different data types.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal when you passively test security controls?

Probing for weaknesses

Infiltrating the network

Interfering with business operations

Exploiting weaknesses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is part of a scan to identify a common misconfiguration?

Packet sniffing

Dictionary attack

Password policy

Router with a default password

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which memory vulnerability is associated with multithreaded applications?

Resource exhaustion

Race condition

DLL injection

Pointer dereferencing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is often the weakest link in the security chain, and represents the largest vulnerability?

End-of-life systems

Untrained users

Lack of vendor support

Embedded systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of vulnerability is demonstrated by a SQL injection?

Default configuration

Improper input handling

Misconfiguration/weak configuration

Improper error handling

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?