Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 13

Mary Smith

Wed, 16 Jul 2025

ComptiA Security+ Certification Exam Questions and answer - Part 13

1. A company has two wireless networks utilizing captive portals. Some employees report getting a trust error in their browsers when connecting to one of the networks. Both captive portals are using the same server certificate for authentication,but the analyst notices the following differences between the two certificate details: Certificate 1 Certificate Path: Geotrust Global CA *company.com Certificate 2 Certificate Path: *company.com Which of the following would resolve the problem?

A) Use certificate chaining.
B) Use an extended validation certificate.
C) Use a trust model.
D) Use a wildcard certificate.



2. After a security assessment was performed on the enterprise network,it was discovered that: 1. Configuration changes have been made by users without the consent of IT. 2. Network congestion has increased due to the use of social media. 3. Users are accessing file folders and network shares that are beyond the scope of their need to know. Which of the following BEST describe the vulnerabilities that exist in this environment? (Choose two.)(Select 2answers)

A) Poorly trained users
B) Improperly configured accounts
C) Misconfigured WAP settings
D) Undocumented assets
E) Vulnerable business processes


3. A bank uses a wireless network to transmit credit card purchases to a billing system. Which of the following would be MOST appropriate to protect credit card information from being accessed by unauthorized individuals outside of the premises?

A) Faraday cage
B) Protected distributions
C) Air gap
D) Infrared detection



4. A company is performing an analysis of the corporate enterprise network with the intent of identifying what will cause losses in revenue,referrals,and/or reputation when out of commission. Which of the following is an element of a BIA that is being addressed?

A) Mission-essential function
B) backup and restoration plans
C) Single point of failure
D) Identification of critical systems



5. A Chief Executive Officer (CEO) suspects someone in the lab testing environment is stealing confidential information after working hours when no one else is around. Which of the following actions can help to prevent this specific threat?

A) Secretly install a hidden surveillance camera.
B) Audit file access times.
C) Implement time-of-day restrictions.
D) Require swipe-card access to enter the lab.



1. Right Answer: A
Explanation:

2. Right Answer: A,B
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A
Explanation: The BIA is composed of the following three steps: Determine mission/business processes and recovery criticality. Mission/business processes supported by the system are identified and the impact of a system disruption to those processes is determined along with outage impacts and estimated downtime.

5. Right Answer: D
Explanation:

0 Comments

Leave a comment