Book Image

Security+® Practice Tests

By : Mike Chapple
Book Image

Security+® Practice Tests

By: Mike Chapple

Overview of this book

Security+ certification is the most popular entry-level certification for cybersecurity professionals. It has no work experience requirement, making it accessible to everyone willing to put in the time to prepare for the exam. Security+? Practice Tests are the perfect tools to prepare for the CompTIA Security+ exam. The first six chapters each cover one of the six Security+ domains. Each of those chapters contains around 100 practice test questions covering the material from that domain. The last two chapters each contain a full-length Security+ practice test that’s designed to assess your readiness to take the actual test. At the end of each chapter, you’ll find the answers to all of the questions along with detailed explanations to help reinforce your learning of the material. By the end of the book, you’ll have enough practice to easily ace the CompTIA Security+ exam.
Table of Contents (9 chapters)

Practice Exam 1 Questions

  1. After running a vulnerability scan on a server containing sensitive information, Mitch discovers the results shown here. What should be Mitch's highest priority?

    Figure 7.1

    A. Modifying encryption settings

    B. Disabling the guest account

    C. Disabling cached logins

    D. Patching and updating software

  2. Gary is configuring a wireless access point that supports the WPS service. What risk exists in all implementations of WPS that he should consider?

    A. Weak encryption

    B. Physical access to the device

    C. An offline brute force attack

    D. Impossible to disable WPS

  3. Alan is a software developer working on a new security patch for one of his organization's products. What environment should he use when actively working on the code?

    A. Production

    B. Test

    C. Development

    D. Staging

  4. Bill suspects that an attacker is exploiting a zero-day vulnerability against his organization. Which one of the following attacker types is most likely to engage in this type of activity...