Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 39

Mary Smith

Sat, 24 May 2025

ComptiA Security+ Certification Exam Questions and answer - Part 39

1. Which of the following is a random value appended to a credential that makes the credential less susceptible to compromise when hashed?

A) IV
B) Nonce
C) OTP
D) Block cipher
E) Salt


2. A security administrator has completed a monthly review of DNS server query logs. The administrator notices continuous name resolution attempts from a large number of internal hosts to a single Internet addressable domain name. The security administrator then correlated those logs with the establishment of persistent TCP connections out to this domain. The connections seem to be carrying on the order of kilobytes of data per week. Which of the following is the MOST likely explanation for this anomaly?

A) Internal hosts have become members of a botnet.
B) Employees are playing multiplayer computer games.
C) An attacker is exfiltrating large amounts of proprietary company data.
D) A worm is attempting to spread to other hosts via SMB exploits.



3. A security administrator is creating a subnet on one of the corporate firewall interfaces to use as a DMZ which is expected to accommodate at most 14 physical hosts. Which of the following subnets would BEST meet the requirements?

A) 192.168.2.32/27
B) 192.168.0.16/28
C) 192.168.1.50 255.255.25.240
D) 192.168.0.16 255.25.255.248



4. A security administrator is configuring a RADIUS server for wireless authentication. The configuration must ensure client credentials are encrypted end-to-end between the client and the authenticator. Which of the following protocols should be configured on the RADIUS server? (Choose two.)(Select 2answers)

A) PAP
B) SAML
C) NTLM
D) MSCHAP
E) PEAP


5. A portable data storage device has been determined to have malicious firmware. Which of the following is the BEST course of action to ensure data confidentiality?

A) Re-image the device
B) Physically destroy the device
C) Perform virus scan in the device
D) Format the device



1. Right Answer: E
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: D,E
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment