Jason Dion Comptia A Practice Test
31 community-sourced questions and answers. Free — no login.
Review the network diagram provided. Which of the following ACL entries should be added to the firewall to allow only the system administrator's computer (IT) to have SSH access to the FTP, Email, and Web servers in the DMZ?
172.16.1.4, 192.168.0.0/24, 22, TCP, ALLOW
Pat is working to allocate appropriate numbers of IP addresses for various subnets in the network for his company. What would be the proper CIDR notation for an IP v4 subnet with 72 nodes?
/24
Josh manages network security at his company and has noticed that NTP is not working correctly. What security protocol will be affected by this?
kerberos
Choose the appropriate attack that sends two different messages using the same hash function, therefore, causing a collision
birthday attack
Josh, as an administrator for a health care company, is required to support an older, legacy application. He's concerned about the application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?
use an application container
Wanda is responsible for network connectivity for her company. The sales department is transitioning to VoIP. What two protocols must be allowed through the firewall for this to be successful?
SIP and RTP
You have recently completed a review of company network traffic and saw where most of the malware infections are caused by users who visit illicit websites. You would like to implement a solution that will block these websites while scanning all network traffic for signs of malware and block the malware before it enters the company network. Which technology would be the best solution?
UTM
Which is a term for technical controls?
logical controls
You're responsible for network protocols. The network time protocol has been failing periodically. What is the most affected?
kerberos
Of the listed principles, which process would transpire if a user provides a correct username and password?
authentication
Which plan identifies critical systems and components to ensure assets are safe and protected?
BCP
Jason needs to renew the certificate for his company's web server. Which of the following is recommended to be submitted to the CA?
CSR
John is a sales manager at his company. He has recently received an email asking him to click a link to fill out a survey. The email seems suspicious but it does mention a major association of which he's familiar, and makes him think it may be a legitimate email. Of the following, which best describes this attack?
spear phishing
You currently work for a large company and are concerned about ensuring all workstations have a common configuration, do not contain a rogue software installation, and all patches are kept up to date. Of the following, which would be most effective to accomplish this?
Use VDE
Nate is considering the use of biometric access control systems for his company. He's concerned about the crossover error rate (CER), so which of the following processes would most accurately describe the CER?
the point at which false rejections and false acceptances are equal
Logan would like to test his company's web application and evaluate if it's handling input validation and data validation properly. Of the following, which testing method would be most effective for this scenario?
fuzzing
Josh is a security technician who's been tasked with implementing PKI on the company's network. When verifying the validity of the certificate, he needs to ensure bandwidth isn't being consumed. What can be implemented?
CRL
Thomas is seeking options for controlling physical access to the server room. He would like a hands-free solution. Which of the following would be his best choice?
proximity cards
Which of the following works like stream ciphers?
one time pad
Janet has to deploy and support a legacy application where the configuration for this application and the OS are very specific and cannot be changed. Of the following options, which is the best approach to deploy this software?
immuatable server
Joe is concerned about attacks to an e-commerce server. He's especially concerned about a cross-site scripting attack and SQL injection. Which of the following would defend against these two attacks?
filtering user input
Of the items listed, which provides additional encryption strength by repeating the encryption process with additional keys?
3DES
Larry is a network administrator for a small accounting firm and has heard some of his users complaining of slow connectivity. When he started investigating the firewall logs, he saw a large number of half-open connections. What best describes his findings?
SYN flood
You are currently testing your company network for security issues. The test you're conducting involves using automated and semi-automated tools to look for known vulnerabilities with various systems. Which of the following best describes this test?
vulnerability scan
Which is the least secure hashing algorithm?
MD5
Sharon is responsible for the security on web applications. She's looking to see if all applications have input validation. What is the best way to implement validation?
client side and server side validation
Josh is a bank manager and has suspicions that one of his tellers has stolen money from their respective station. After talking with his supervisor, he places the employee on leave with pay, changes their computer account to suspended, and takes their prox card and building keys. Which procedure was followed?
adverse actions
Lori is concerned about DHCP starvation attacks, especially since learning that anyone can download a software called a "gobbler" and use it to execute a DHCP starvation attack. What technology would help mitigate this risk?
network address allocation
Network address allocation allocates network addresses (hence the name). This can be done either by limiting the IP addresses to a certain number as well as a few other ways. Encrypting communications is a great idea but it doesn't mitigate the issue, FDE doesn't mitigate the issue either and IPSec can be a good answer, but the transmission is not the issue in this scenario.
hardware based access control
A user swipes her finger on the biometric sensor for the data center but receives an Access Denied notification. She was recently in the server room and is simply returning. She tries again on the scanner and is permitted inside. What is the term used when a system denies access to a user who should actually be allowed on the system?
False negative
The CompTIA Security+ exam covers areas such as implementing the appropriate security controls, which can have a positive impact on an organization's overall security posture. Controls such as log monitoring, trend analysis, security audits, video surveillance, and motion detection all fall under which of the following control categories?
Detective
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials