Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 19

Mary Smith

Mon, 24 Mar 2025

ComptiA Security+ Certification Exam Questions and answer - Part 19

1. A Chief Information Officer (CIO) has decided it is not cost effective to implement safeguards against a known vulnerability. Which of the following risk responses does this BEST describe?

A) Acceptance
B) Transference
C) Mitigation
D) Avoidance



2. An administrator is replacing a wireless router. The configuration of the old wireless router was not documented before it stopped functioning. The equipment connecting to the wireless network uses older legacy equipment that was manufactured prior to the release of the 802.11i standard. Which of the following configuration options should the administrator select for the new wireless router?

A) WPA+CCMP
B) WPA2+CCMP
C) WPA+TKIP
D) WPA2+TKIP



3. An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?

A) Find two identical messages with different hashes
B) Find two identical messages with the same hash
C) Find a common has between two specific messages
D) Find a common hash between a specific message and a random message



4. An administrator thinks the UNIX systems may be compromised,but a review of system log files provides no useful information. After discussing the situation with the security team,the administrator suspects that the attacker may be altering the log files and removing evidence of intrusion activity. Which of the following actions will help detect attacker attempts to further alter log files?

A) Enable verbose system logging
B) Change the permissions on the user's home directory
C) Implement remote syslog
D) Set the bash_history log file to 'read only'



5. An analyst is part of a team that is investigating a potential breach of sensitive data at a large financial services organization. The organization suspects a breach occurred when proprietary data was disclosed to the public. The team finds servers were accessed using shared credentials that have been in place for some time. In addition,the team discovers undocumented firewall rules,which provided unauthorized external access to a server. Suspecting the activities of a malicious insider threat,which of the following was MOST likely to have been utilized to exfiltrate the proprietary data?

A) Keylogger
B) Botnet
C) Crypto-malware
D) Backdoor
E) Ransomware
F) DLP

1. Right Answer: A
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment