IT CertificationsAnswer Key

Jason Dion Comptia A Practice Test

31 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Review the network diagram provided. Which of the following ACL entries should be added to the firewall to allow only the system administrator's computer (IT) to have SSH access to the FTP, Email, and Web servers in the DMZ?

ANSWER

172.16.1.4, 192.168.0.0/24, 22, TCP, ALLOW

QUESTION 2

Pat is working to allocate appropriate numbers of IP addresses for various subnets in the network for his company. What would be the proper CIDR notation for an IP v4 subnet with 72 nodes?

ANSWER

/24

QUESTION 3

Josh manages network security at his company and has noticed that NTP is not working correctly. What security protocol will be affected by this?

ANSWER

kerberos

QUESTION 4

Choose the appropriate attack that sends two different messages using the same hash function, therefore, causing a collision

ANSWER

birthday attack

QUESTION 5

Josh, as an administrator for a health care company, is required to support an older, legacy application. He's concerned about the application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?

ANSWER

use an application container

QUESTION 6

Wanda is responsible for network connectivity for her company. The sales department is transitioning to VoIP. What two protocols must be allowed through the firewall for this to be successful?

ANSWER

SIP and RTP

QUESTION 7

You have recently completed a review of company network traffic and saw where most of the malware infections are caused by users who visit illicit websites. You would like to implement a solution that will block these websites while scanning all network traffic for signs of malware and block the malware before it enters the company network. Which technology would be the best solution?

ANSWER

UTM

QUESTION 8

Which is a term for technical controls?

ANSWER

logical controls

QUESTION 9

You're responsible for network protocols. The network time protocol has been failing periodically. What is the most affected?

ANSWER

kerberos

QUESTION 10

Of the listed principles, which process would transpire if a user provides a correct username and password?

ANSWER

authentication

QUESTION 11

Which plan identifies critical systems and components to ensure assets are safe and protected?

ANSWER

BCP

QUESTION 12

Jason needs to renew the certificate for his company's web server. Which of the following is recommended to be submitted to the CA?

ANSWER

CSR

QUESTION 13

John is a sales manager at his company. He has recently received an email asking him to click a link to fill out a survey. The email seems suspicious but it does mention a major association of which he's familiar, and makes him think it may be a legitimate email. Of the following, which best describes this attack?

ANSWER

spear phishing

QUESTION 14

You currently work for a large company and are concerned about ensuring all workstations have a common configuration, do not contain a rogue software installation, and all patches are kept up to date. Of the following, which would be most effective to accomplish this?

ANSWER

Use VDE

QUESTION 15

Nate is considering the use of biometric access control systems for his company. He's concerned about the crossover error rate (CER), so which of the following processes would most accurately describe the CER?

ANSWER

the point at which false rejections and false acceptances are equal

QUESTION 16

Logan would like to test his company's web application and evaluate if it's handling input validation and data validation properly. Of the following, which testing method would be most effective for this scenario?

ANSWER

fuzzing

QUESTION 17

Josh is a security technician who's been tasked with implementing PKI on the company's network. When verifying the validity of the certificate, he needs to ensure bandwidth isn't being consumed. What can be implemented?

ANSWER

CRL

QUESTION 18

Thomas is seeking options for controlling physical access to the server room. He would like a hands-free solution. Which of the following would be his best choice?

ANSWER

proximity cards

QUESTION 19

Which of the following works like stream ciphers?

ANSWER

one time pad

QUESTION 20

Janet has to deploy and support a legacy application where the configuration for this application and the OS are very specific and cannot be changed. Of the following options, which is the best approach to deploy this software?

ANSWER

immuatable server

QUESTION 21

Joe is concerned about attacks to an e-commerce server. He's especially concerned about a cross-site scripting attack and SQL injection. Which of the following would defend against these two attacks?

ANSWER

filtering user input

QUESTION 22

Of the items listed, which provides additional encryption strength by repeating the encryption process with additional keys?

ANSWER

3DES

QUESTION 23

Larry is a network administrator for a small accounting firm and has heard some of his users complaining of slow connectivity. When he started investigating the firewall logs, he saw a large number of half-open connections. What best describes his findings?

ANSWER

SYN flood

QUESTION 24

You are currently testing your company network for security issues. The test you're conducting involves using automated and semi-automated tools to look for known vulnerabilities with various systems. Which of the following best describes this test?

ANSWER

vulnerability scan

QUESTION 25

Which is the least secure hashing algorithm?

ANSWER

MD5

QUESTION 26

Sharon is responsible for the security on web applications. She's looking to see if all applications have input validation. What is the best way to implement validation?

ANSWER

client side and server side validation

QUESTION 27

Josh is a bank manager and has suspicions that one of his tellers has stolen money from their respective station. After talking with his supervisor, he places the employee on leave with pay, changes their computer account to suspended, and takes their prox card and building keys. Which procedure was followed?

ANSWER

adverse actions

QUESTION 28

Lori is concerned about DHCP starvation attacks, especially since learning that anyone can download a software called a "gobbler" and use it to execute a DHCP starvation attack. What technology would help mitigate this risk?

ANSWER

network address allocation

QUESTION 29

Network address allocation allocates network addresses (hence the name). This can be done either by limiting the IP addresses to a certain number as well as a few other ways. Encrypting communications is a great idea but it doesn't mitigate the issue, FDE doesn't mitigate the issue either and IPSec can be a good answer, but the transmission is not the issue in this scenario.

ANSWER

hardware based access control

QUESTION 30

A user swipes her finger on the biometric sensor for the data center but receives an Access Denied notification. She was recently in the server room and is simply returning. She tries again on the scanner and is permitted inside. What is the term used when a system denies access to a user who should actually be allowed on the system?

ANSWER

False negative

QUESTION 31

The CompTIA Security+ exam covers areas such as implementing the appropriate security controls, which can have a positive impact on an organization's overall security posture. Controls such as log monitoring, trend analysis, security audits, video surveillance, and motion detection all fall under which of the following control categories?

ANSWER

Detective

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials