Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 3

Mary Smith

Mon, 17 Mar 2025

ComptiA Security+ Certification Exam Questions and answer - Part 3

1. A member of the admins group reports being unable to modify the 'changes' file on a server. The permissions on the file are as follows: Permissions User Group File -rwxrw-r--+ Admins Admins changes Based on the output above,which of the following BEST explains why the user is unable to modify the 'changes' file?

A) The SELinux mode on the server is set to 'permissive.'
B) The SELinux mode on the server is set to 'enforcing.'
C) An FACL has been added to the permissions for the file.
D) The admins group does not have adequate permissions to access the file.



2. A mobile device user is concerned about geographic positioning information being included in messages sent between users on a popular social network platform. The user turns off the functionality in the application,but wants to ensure the application cannot re-enable the setting without the knowledge of the user. Which of the following mobile device capabilities should the user disable to achieve the stated goal?

A) Application control
B) Location based services
C) GEO-Tagging
D) Device access control



3. After attempting to harden a web server,a security analyst needs to determine if an application remains vulnerable to SQL injection attacks. Which of the following would BEST assist the analyst in making this determination?

A) Fuzzer
B) Nmap
C) tracert
D) netcat
E) nslookup


4. A manager wants to distribute a report to several other managers within the company. Some of them reside in remote locations that are not connected to the domain but have a local server. Because there is sensitive data within the report and the size of the report is beyond the limit of the email attachment size,emailing the report is not an option. Which of the following protocols should be implemented to distribute the report securely? (Select three.)(Select 3answers)

A) HTTPS
B) SSH
C) SRTP
D) SNMPv3
E) S/MIME
F) FTPS

5. A company is using a mobile device deployment model in which employees use their personal devices for work at their own discretion. Some of the problems the company is encountering include the following: There is no standardization. Employees ask for reimbursement for their devices. Employees do not replace their devices often enough to keep them running efficiently. The company does not have enough control over the devices. Which of the following is a deployment model that would help the company overcome these problems?

A) CYOD
B) BYOD
C) VDI
D) COPE



1. Right Answer: C
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: A,B,F
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment