CompTIA Security+ Quiz
CompTIA Security+ Quiz
Quiz-summary
0 of 130 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
Information
CompTIA Security+ Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 130 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Keep it up
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- Answered
- Review
-
Question 1 of 130
1. Question
1 pointsWhat is the primary goal of information security?
Correct
Incorrect
-
Question 2 of 130
2. Question
1 pointsWhich of the following is a common security principle known as the “principle of least privilege”?
Correct
Incorrect
-
Question 3 of 130
3. Question
1 pointsWhich encryption protocol is commonly used to secure web traffic?
Correct
Incorrect
-
Question 4 of 130
4. Question
1 pointsWhich type of malware disguises itself as a legitimate program or file?
Correct
Incorrect
-
Question 5 of 130
5. Question
1 pointsWhat is the purpose of a firewall in a network security context?
Correct
Incorrect
-
Question 6 of 130
6. Question
1 pointsWhich of the following is not a secure password practice?
Correct
Incorrect
-
Question 7 of 130
7. Question
1 pointsWhat is the purpose of biometric authentication?
Correct
Incorrect
-
Question 8 of 130
8. Question
1 pointsWhat is the primary security concern with public Wi-Fi networks?
Correct
Incorrect
-
Question 9 of 130
9. Question
1 pointsWhich encryption algorithm is commonly used for securing email communication?
Correct
Incorrect
-
Question 10 of 130
10. Question
1 pointsWhat is the purpose of a security policy in an organization?
Correct
Incorrect
-
Question 11 of 130
11. Question
1 pointsWhat is a DMZ in network security?
Correct
Incorrect
-
Question 12 of 130
12. Question
1 pointsWhich security protocol is used to secure remote logins and data transfers over the internet?
Correct
Incorrect
-
Question 13 of 130
13. Question
1 pointsWhat is the primary function of an intrusion detection system (IDS)?
Correct
Incorrect
-
Question 14 of 130
14. Question
1 pointsIn the context of cryptography, what is the term for the process of converting plaintext into unreadable text?
Correct
Incorrect
-
Question 15 of 130
15. Question
1 pointsWhich of the following is an example of a physical security control?
Correct
Incorrect
-
Question 16 of 130
16. Question
1 pointsWhich protocol is commonly used for secure remote access to a corporate network?
Correct
Incorrect
-
Question 17 of 130
17. Question
1 pointsWhat is a common social engineering technique that involves sending fraudulent emails to trick recipients into revealing sensitive information?
Correct
Incorrect
-
Question 18 of 130
18. Question
1 pointsWhat type of attack involves an attacker making multiple attempts to guess a user’s password?
Correct
Incorrect
-
Question 19 of 130
19. Question
1 pointsWhich of the following is a best practice for wireless network security?
Correct
Incorrect
-
Question 20 of 130
20. Question
1 pointsWhat is the purpose of a security risk assessment?
Correct
Incorrect
-
Question 21 of 130
21. Question
1 pointsWhat is the primary purpose of access control in information security?
Correct
Incorrect
-
Question 22 of 130
22. Question
1 pointsWhich of the following is a type of denial-of-service (DoS) attack that uses multiple compromised systems to flood a target with traffic?
Correct
Incorrect
-
Question 23 of 130
23. Question
1 pointsWhat is the primary function of a security token in two-factor authentication (2FA)?
Correct
Incorrect
-
Question 24 of 130
24. Question
1 pointsWhich of the following is an example of a secure disposal method for old hard drives and storage media?
Correct
Incorrect
-
Question 25 of 130
25. Question
1 pointsWhat is the primary purpose of a security incident response plan?
Correct
Incorrect
-
Question 26 of 130
26. Question
1 pointsWhat is the primary purpose of a VPN (Virtual Private Network)?
Correct
Incorrect
-
Question 27 of 130
27. Question
1 pointsWhich security concept involves the practice of separating duties and responsibilities among multiple employees or systems to prevent fraud or errors?
Correct
Incorrect
-
Question 28 of 130
28. Question
1 pointsWhat is a common method for securing mobile devices and data on them?
Correct
Incorrect
-
Question 29 of 130
29. Question
1 pointsWhat type of malware encrypts a user’s data and demands a ransom for decryption?
Correct
Incorrect
-
Question 30 of 130
30. Question
1 pointsWhich cryptographic algorithm is commonly used to secure web traffic and provide data integrity and authentication?
Correct
Incorrect
-
Question 31 of 130
31. Question
1 pointsWhich of the following is an example of a physical access control method?
Correct
Incorrect
-
Question 32 of 130
32. Question
1 pointsWhat does the term “pharming” refer to in the context of security threats?
Correct
Incorrect
-
Question 33 of 130
33. Question
1 pointsWhich security protocol is commonly used to encrypt email messages?
Correct
Incorrect
-
Question 34 of 130
34. Question
1 pointsWhich of the following is a secure method for disposing of printed documents that contain sensitive information?
Correct
Incorrect
-
Question 35 of 130
35. Question
1 pointsWhat is the primary purpose of an intrusion prevention system (IPS)?
Correct
Incorrect
-
Question 36 of 130
36. Question
1 pointsWhat is a common security measure to protect against malware infections in an organization?
Correct
Incorrect
-
Question 37 of 130
37. Question
1 pointsWhich encryption protocol is commonly used to secure email communication between clients and servers?
Correct
Incorrect
-
Question 38 of 130
38. Question
1 pointsWhat is the primary purpose of a network firewall?
Correct
Incorrect
-
Question 39 of 130
39. Question
1 pointsWhat is the purpose of a Certificate Authority (CA) in a Public Key Infrastructure (PKI) system?
Correct
Incorrect
-
Question 40 of 130
40. Question
1 pointsWhich of the following is a common method to protect against eavesdropping on wireless networks?
Correct
Incorrect
-
Question 41 of 130
41. Question
1 pointsWhat does the term “zero-day vulnerability” refer to in the context of security?
Correct
Incorrect
-
Question 42 of 130
42. Question
1 pointsWhat is the purpose of penetration testing in cybersecurity?
Correct
Incorrect
-
Question 43 of 130
43. Question
1 pointsWhich authentication factor falls into the “something you know” category?
Correct
Incorrect
-
Question 44 of 130
44. Question
1 pointsWhat is the primary function of a proxy server in a network security context?
Correct
Incorrect
-
Question 45 of 130
45. Question
1 pointsWhich of the following is a key component of a disaster recovery plan (DRP)?
Correct
Incorrect
-
Question 46 of 130
46. Question
1 pointsWhat is the purpose of a Security Information and Event Management (SIEM) system?
Correct
Incorrect
-
Question 47 of 130
47. Question
1 pointsWhat is the term for a system that verifies the identity of a user or device before allowing access to a network or application?
Correct
Incorrect
-
Question 48 of 130
48. Question
1 pointsWhich of the following is a best practice for secure password management?
Correct
Incorrect
-
Question 49 of 130
49. Question
1 pointsWhat is a common form of physical security control for restricting access to a data center or server room?
Correct
Incorrect
-
Question 50 of 130
50. Question
1 pointsWhat does the term “BYOD” stand for in the context of security?
Correct
Incorrect
-
Question 51 of 130
51. Question
1 pointsWhat is the purpose of a VPN concentrator in a virtual private network (VPN) infrastructure?
Correct
Incorrect
-
Question 52 of 130
52. Question
1 pointsWhich of the following is a common security protocol used for remote desktop access?
Correct
Incorrect
-
Question 53 of 130
53. Question
1 pointsWhat does “SSO” stand for in the context of access control?
Correct
Incorrect
-
Question 54 of 130
54. Question
1 pointsWhat is the primary purpose of a security token in multi-factor authentication (MFA)?
Correct
Incorrect
-
Question 55 of 130
55. Question
1 pointsWhat is the primary goal of network segmentation in security architecture?
Correct
Incorrect
-
Question 56 of 130
56. Question
1 pointsWhich of the following is a common wireless security protocol that provides encryption for wireless networks?
Correct
Incorrect
-
Question 57 of 130
57. Question
1 pointsWhat does “ACL” stand for in network security?
Correct
Incorrect
-
Question 58 of 130
58. Question
1 pointsWhat is the term for a security mechanism that grants or denies access based on the source IP address of incoming traffic?
Correct
Incorrect
-
Question 59 of 130
59. Question
1 pointsWhat is the primary purpose of data loss prevention (DLP) technology?
Correct
Incorrect
-
Question 60 of 130
60. Question
1 pointsWhat is the term for a security technique that hides internal network addresses from external view?
Correct
Incorrect
-
Question 61 of 130
61. Question
1 pointsWhat does “PKI” stand for in the context of security?
Correct
Incorrect
-
Question 62 of 130
62. Question
1 pointsWhat is the primary purpose of a security assessment or audit?
Correct
Incorrect
-
Question 63 of 130
63. Question
1 pointsWhich of the following is an example of a security control for protecting against data exfiltration?
Correct
Incorrect
-
Question 64 of 130
64. Question
1 pointsWhat is the primary purpose of a security awareness and training program within an organization?
Correct
Incorrect
-
Question 65 of 130
65. Question
1 pointsWhich of the following is a common security measure for protecting against SQL injection attacks?
Correct
Incorrect
-
Question 66 of 130
66. Question
1 pointsWhat does “MAC” stand for in the context of security?
Correct
Incorrect
-
Question 67 of 130
67. Question
1 pointsWhich of the following is an example of a public cloud service model?
Correct
Incorrect
-
Question 68 of 130
68. Question
1 pointsWhat is the primary purpose of a security incident response plan (SIRP)?
Correct
Incorrect
-
Question 69 of 130
69. Question
1 pointsWhat is the primary purpose of a security baseline in security configuration management?
Correct
Incorrect
-
Question 70 of 130
70. Question
1 pointsWhat does the term “RTO” stand for in the context of disaster recovery?
Correct
Incorrect
-
Question 71 of 130
71. Question
1 pointsWhat is the primary purpose of a security assessment in the context of risk management?
Correct
Incorrect
-
Question 72 of 130
72. Question
1 pointsWhat does “OT” stand for in the context of cybersecurity?
Correct
Incorrect
-
Question 73 of 130
73. Question
1 pointsWhich of the following is a common security measure to protect against ransomware attacks?
Correct
Incorrect
-
Question 74 of 130
74. Question
1 pointsWhat is the primary function of a security policy in an organization?
Correct
Incorrect
-
Question 75 of 130
75. Question
1 pointsWhat does the term “MFA” stand for in the context of authentication?
Correct
Incorrect
-
Question 76 of 130
76. Question
1 pointsWhat is the primary purpose of a data classification policy?
Correct
Incorrect
-
Question 77 of 130
77. Question
1 pointsWhat does the term “DLP” stand for in the context of security?
Correct
Incorrect
-
Question 78 of 130
78. Question
1 pointsWhat is the primary purpose of a business continuity plan (BCP)?
Correct
Incorrect
-
Question 79 of 130
79. Question
1 pointsWhat is the purpose of a security control in information security?
Correct
Incorrect
-
Question 80 of 130
80. Question
1 pointsWhat is the term for a system that allows organizations to track and manage the access rights of employees to various resources?
Correct
Incorrect
-
Question 81 of 130
81. Question
1 pointsWhat does the term “IoT” stand for in the context of cybersecurity?
Correct
Incorrect
-
Question 82 of 130
82. Question
1 pointsWhat is the primary goal of a disaster recovery plan (DRP)?
Correct
Incorrect
-
Question 83 of 130
83. Question
1 pointsWhich of the following is a common authentication factor in multi-factor authentication (MFA)?
Correct
Incorrect
-
Question 84 of 130
84. Question
1 pointsWhat is the primary function of a security incident response plan (SIRP)?
Correct
Incorrect
-
Question 85 of 130
85. Question
1 pointsWhat is the purpose of a security token in two-factor authentication (2FA)?
Correct
Incorrect
-
Question 86 of 130
86. Question
1 pointsWhat does “SSD” stand for in the context of encryption?
Correct
Incorrect
-
Question 87 of 130
87. Question
1 pointsWhat is the term for the process of examining and testing the security of an information system to identify vulnerabilities?
Correct
Incorrect
-
Question 88 of 130
88. Question
1 pointsWhat is the primary purpose of a secure email gateway in an organization?
Correct
Incorrect
-
Question 89 of 130
89. Question
1 pointsWhat does the term “EOL” stand for in the context of software and hardware maintenance?
Correct
Incorrect
-
Question 90 of 130
90. Question
1 pointsWhat is the term for the process of concealing one’s identity on the internet by rerouting network traffic through multiple servers or nodes?
Correct
Incorrect
-
Question 91 of 130
91. Question
1 pointsWhat is the primary purpose of a security template in system security?
Correct
Incorrect
-
Question 92 of 130
92. Question
1 pointsWhat does the term “SSO” stand for in the context of authentication?
Correct
Incorrect
-
Question 93 of 130
93. Question
1 pointsWhich of the following is a common security measure for securing mobile devices?
Correct
Incorrect
-
Question 94 of 130
94. Question
1 pointsWhat is the primary purpose of a vulnerability assessment in cybersecurity?
Correct
Incorrect
-
Question 95 of 130
95. Question
1 pointsWhich of the following is an example of a biometric authentication method?
Correct
Incorrect
-
Question 96 of 130
96. Question
1 pointsWhat is the primary purpose of a security token in two-factor authentication (2FA)?
Correct
Incorrect
-
Question 97 of 130
97. Question
1 pointsWhat is the term for a system that monitors and controls access to physical spaces, such as server rooms or data centers?
Correct
Incorrect
-
Question 98 of 130
98. Question
1 pointsWhat is the primary purpose of a security policy in an organization?
Correct
Incorrect
-
Question 99 of 130
99. Question
1 pointsWhich of the following is a common network security protocol for securing remote login sessions?
Correct
Incorrect
-
Question 100 of 130
100. Question
1 pointsWhat is the term for the process of converting encrypted data back into its original form?
Correct
Incorrect
-
Question 101 of 130
101. Question
1 pointsWhat does “DOS” stand for in the context of cybersecurity?
Correct
Incorrect
-
Question 102 of 130
102. Question
1 pointsWhat is the primary purpose of a security assessment in the context of risk management?
Correct
Incorrect
-
Question 103 of 130
103. Question
1 pointsWhich of the following is a common security measure to protect against password attacks?
Correct
Incorrect
-
Question 104 of 130
104. Question
1 pointsWhat is the term for the process of confirming that a user is who they claim to be in the context of authentication?
Correct
Incorrect
-
Question 105 of 130
105. Question
1 pointsWhich security concept involves limiting user access to the minimum level required to perform their job functions?
Correct
Incorrect
-
Question 106 of 130
106. Question
1 pointsWhat does “NAC” stand for in the context of network security?
Correct
Incorrect
-
Question 107 of 130
107. Question
1 pointsWhat is the primary purpose of a security information and event management (SIEM) system?
Correct
Incorrect
-
Question 108 of 130
108. Question
1 pointsWhat is the term for a program or device that can spread and replicate itself to other systems, often with malicious intent?
Correct
Incorrect
-
Question 109 of 130
109. Question
1 pointsWhich of the following is an example of a security control for protecting against malware?
Correct
Incorrect
-
Question 110 of 130
110. Question
1 pointsWhat is the term for a technique used to trick individuals into revealing sensitive information, such as usernames and passwords, by posing as a trustworthy entity?
Correct
Incorrect
-
Question 111 of 130
111. Question
1 pointsWhat is the primary goal of network segmentation in a security context?
Correct
Incorrect
-
Question 112 of 130
112. Question
1 pointsWhat is the term for a security measure that monitors and records access to a system or network for analysis and auditing?
Correct
Incorrect
-
Question 113 of 130
113. Question
1 pointsWhich of the following is an example of a security control for protecting against a brute force attack on user passwords?
Correct
Incorrect
-
Question 114 of 130
114. Question
1 pointsWhat does “BYOD” stand for in the context of security?
Correct
Incorrect
-
Question 115 of 130
115. Question
1 pointsWhat is the primary purpose of a security control called “firewall”?
Correct
Incorrect
-
Question 116 of 130
116. Question
1 pointsWhat is the primary purpose of a security control called “IDS” (Intrusion Detection System)?
Correct
Incorrect
-
Question 117 of 130
117. Question
1 pointsWhat is the primary purpose of a security control called “IPS” (Intrusion Prevention System)?
Correct
Incorrect
-
Question 118 of 130
118. Question
1 pointsWhat is the term for a hardware or software solution that provides authentication for users and devices to access a network or application?
Correct
Incorrect
-
Question 119 of 130
119. Question
1 pointsWhat is the primary purpose of a digital certificate in public key infrastructure (PKI)?
Correct
Incorrect
-
Question 120 of 130
120. Question
1 pointsWhat is the term for a method that allows an organization to grant or deny access to specific areas within a facility based on an individual’s role and responsibilities?
Correct
Incorrect
-
Question 121 of 130
121. Question
1 pointsWhat does “WPA” stand for in the context of wireless network security?
Correct
Incorrect
-
Question 122 of 130
122. Question
1 pointsWhat is the primary purpose of a security policy in an organization?
Correct
Incorrect
-
Question 123 of 130
123. Question
1 pointsWhat is the primary purpose of a proxy server in a network security context?
Correct
Incorrect
-
Question 124 of 130
124. Question
1 pointsWhat does the term “ACL” stand for in network security?
Correct
Incorrect
-
Question 125 of 130
125. Question
1 pointsWhat is the primary purpose of a security awareness and training program within an organization?
Correct
Incorrect
-
Question 126 of 130
126. Question
1 pointsWhat is the term for a security measure that enforces strict control over data flows in and out of a network, based on a set of rules?
Correct
Incorrect
-
Question 127 of 130
127. Question
1 pointsWhat is the primary purpose of data classification in an organization?
Correct
Incorrect
-
Question 128 of 130
128. Question
1 pointsWhat does the term “DRP” stand for in the context of cybersecurity?
Correct
Incorrect
-
Question 129 of 130
129. Question
1 pointsWhat is the term for a type of security control that restricts the actions that authenticated users can perform on a system or network?
Correct
Incorrect
-
Question 130 of 130
130. Question
1 pointsWhat does “MFA” stand for in the context of authentication?
Correct
Incorrect