CompTIA Security+ Book Practice Test 4

CompTIA Security+ Book Practice Test 4

12th Grade

39 Qs

quiz-placeholder

Similar activities

CyberPatriots!

CyberPatriots!

3rd Grade - Professional Development

38 Qs

ICS3U-loops quiz

ICS3U-loops quiz

11th - 12th Grade

44 Qs

Computer Science first Quiz

Computer Science first Quiz

10th - 12th Grade

36 Qs

System Monitoring Tools Quiz

System Monitoring Tools Quiz

12th Grade

40 Qs

Mini Review 1

Mini Review 1

9th - 12th Grade

36 Qs

Python L3 Concepts

Python L3 Concepts

4th - 12th Grade

40 Qs

MIKROTIK - VPN TUNNELING

MIKROTIK - VPN TUNNELING

9th - 12th Grade

40 Qs

PAS GANJIL TEKNIK LAYANAN JARINGAN XII TKJ

PAS GANJIL TEKNIK LAYANAN JARINGAN XII TKJ

12th Grade

40 Qs

CompTIA Security+ Book Practice Test 4

CompTIA Security+ Book Practice Test 4

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Michelle wants to check for authentication failures on a CentOS Linux-based system. Where should she look for these event logs?

/var/log/auth.log

/var/log/fail

/var/log/events

/var/log/secure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following capabilities is not built into Autopsy?

Disk imaging

Timeline generation

Automatic image filtering

Communication visualization

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jessica wants to review the network traffic that her Windows system has sent to determine if a file containing sensitive data was uploaded from the system. What Windows log file can she use to find this information?

The application log

The network log

The security log

None of the above

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Valerie wants to capture the pagefile from a Windows system. Where can she find the file for acquisition?

C:\Windows\swap

C:\pagefile.sys

C:\Windows\users\swap.sys

C:\swap\pagefile.sys

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common type of incident response exercise?

Drills

Simulations

Tabletop

Walk-throughs

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Nick is reviewing commands run on a Windows 10 system and discovers that the route command was run with the -p flag. What occurred?

Routes were discovered using a ping command.

The route's path will be displayed.

A route was added that will persist between boots.

A route was added that will use the path listed in the command.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What mitigation technique is used to limit the ability of an attack to continue while keeping systems and services online?

Segmentation

Isolation

Nuking

Containment

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?