Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 26

Mary Smith

Sat, 24 May 2025

ComptiA Security+ Certification Exam Questions and answer - Part 26

1. A new firewall has been places into service at an organization. However,a configuration has not been entered on the firewall. Employees on the network segment covered by the new firewall report they are unable to access the network. Which of the following steps should be completed to BEST resolve the issue?

A) The firewall should be configured to prevent user traffic form matching the implicit deny rule.
B) The firewall should be configured with access lists to allow inbound and outbound traffic.
C) The firewall should be configured with port security to allow traffic.
D) The firewall should be configured to include an explicit deny rule.



2. A new hire wants to use a personally owned phone to access company resources. The new hire expresses concern about what happens to the data on the phone when they leave the company. Which of the following portions of the company's mobile device management configuration would allow the company data to be removed from the device without touching the new hire's data?

A) Asset control
B) Device access control
C) Storage lock out
D) Storage segmentation



3. A new intern in the purchasing department requires read access to shared documents. Permissions are normally controlled through a group called 'Purchasing',however,the purchasing group permissions allow write access. Which of the following would be the BEST course of action?

A) Modify all the shared files with read only permissions for the intern.
B) Create a new group that has only read permissions for the files.
C) Remove all permissions for the shared files.
D) Add the intern to the 'Purchasing' group.



4. A new mobile application is being developed in-house. Security reviews did not pick up any major flaws,however vulnerability scanning results show fundamental issues at the very end of the project cycle. Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?

A) Architecture review
B) Risk assessment
C) Protocol analysis
D) Code review



5. A new security administrator ran a vulnerability scanner for the first time and caused a system outage. Which of the following types of scans MOST likely caused the outage?

A) Non-intrusive credentialed scan
B) Non-intrusive non-credentialed scan
C) Intrusive credentialed scan
D) Intrusive non-credentialed scan



1. Right Answer: A
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: D
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment