Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 35

Mary Smith

Tue, 18 Nov 2025

ComptiA Security+ Certification Exam Questions and answer - Part 35

1. An organization - s primary datacenter is experiencing a two-day outage due to an HVAC malfunction. The node located in the datacenter has lost power and is no longer operational,impacting the ability of all users to connect to the alternate datacenter. Which of the following BIA concepts BEST represents the risk described in this scenario?

A) SPoF
B) RTO
C) MTBF
D) MTTR



2. An organization uses SSO authentication for employee access to network resources. When an employee resigns,as per the organization - s security policy,the employee - s access to all network resources is terminated immediately. Two weeks later,the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?

A) Approve the former employee - s request,as a password reset would give the former employee access to only the human resources server.
B) Deny the former employee - s request,since the password reset request came from an external email address.
C) Deny the former employee - s request,as a password reset would give the employee access to all network resources.
D) Approve the former employee - s request,as there would not be a security issue with the former employee gaining access to network resources.



3. An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files,the organization wants to ensure a secure exchange of keys. Which of the following algorithms is appropriate for securing the key exchange?

A) DES
B) Blowfish
C) DSA
D) Diffie-Hellman
E) 3DES


4. An organization wants to ensure network access is granted only after a user or device has been authenticated. Which of the following should be used to achieve this objective for both wired and wireless networks?

A) CCMP
B) PKCS#12
C) IEEE 802.1X
D) OCSP



5. An organization wants to implement a method to correct risks at the system/application layer. Which of the following is the BEST method to accomplish this goal?

A) IDS/IPS
B) IP tunneling
C) Web application firewall
D) Patch management



1. Right Answer: A
Explanation:

2. Right Answer: C
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment