Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 41

Mary Smith

Sat, 12 Jul 2025

ComptiA Security+ Certification Exam Questions and answer - Part 41

1. A security analyst is hardening a server with the directory services role installed. The analyst must ensure LDAP traffic cannot be monitored or sniffed and maintains compatibility with LDAP clients. Which of the following should the analyst implement to meet these requirements? (Select two.)(Select 2answers)

A) Install and configure an SSH tunnel on the LDAP server
B) Ensure port 389 is open between the clients and the servers using the communication
C) Remote the LDAP directory service role from the server
D) Ensure port 636 is open between the clients and the servers using the communication
E) Generate an X.509-compliant certificate that is signed by a trusted CA


2. A small- to medium-sized company wants to block the use of USB devices on its network. Which of the following is the MOST cost-effective way for the security analyst to prevent this?

A) Enforce the AUP.
B) Apply a GPO
C) Conduct user awareness training
D) Implement a DLP system



3. A security analyst is implementing PKI-based functionality to a web application that has the following requirements: File contains certificate information Certificate chains Root authority certificates Private key All of these components will be part of one file and cryptographically protected with a password. Given this scenario,which of the following certificate types should the analyst implement to BEST meet these requirements?

A) .der certificate
B) .pfx certificate
C) .cer certificate
D) .crt certificate



4. A security consultant discovers that an organization is using the PCL protocol to print documents,utilizing the default driver and print settings. Which of the following is the MOST likely risk in this situation?

A) An attacker can easily inject malicious code into the printer firmware.
B) Attackers can use the PCL protocol to bypass the firewall of client computers.
C) An attacker can access and change the printer configuration.
D) An MITM attack can reveal sensitive information.
E) SNMP data leaving the printer will not be properly encrypted.


5. A security technician has been given the task of preserving emails that are potentially involved in a dispute between a company and a contractor. Which of the following BEST describes this forensic concept?

A) Chain of custody
B) Data acquisition
C) Order of volatility
D) Legal hold



1. Right Answer: D,E
Explanation:

2. Right Answer: B
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: E
Explanation:

5. Right Answer: D
Explanation:

0 Comments

Leave a comment