Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 47

Mary Smith

Mon, 24 Mar 2025

ComptiA Security+ Certification Exam Questions and answer - Part 47

1. A security administrator has written a script that will automatically upload binary and text-based configuration files onto a remote server using a scheduled task. The configuration files contain sensitive information. Which of the following should the administrator use? (Select TWO)(Select 2answers)

A) Certificate-based authentication
B) SRTP
C) SNMPv3
D) FTP over a non-standard pot
E) TOPT
F) SCP

2. A security administrator is evaluating three different services: radius,diameter,and Kerberos. Which of the following is a feature that is UNIQUE to Kerberos?

A) It provides authentication services
B) It provides single sign-on capability
C) It uses XML for cross-platform interoperability
D) It uses tickets to identify authenticated users



3. A security administrator wants to determine if a company - s web servers have the latest operating system and application patches installed. Which of the following types of vulnerability scans should be conducted?

A) Passive
B) Port
C) Non-credentialed
D) Active
E) Red team
F) Credentialed

4. A security administrator is tasked with implementing centralized management of all network devices. Network administrators will be required to logon to network devices using their LDAP credentials. All command executed by network administrators on network devices must fall within a preset list of authorized commands and must be logged to a central facility. Which of the following configuration commands should be implemented to enforce this requirement?

A) SYSLOG SERVER 172.16.23.50
B) LDAP server 10.55.199.3
C) CN=company,CN=com,OU=netadmin,DC=192.32.10.233
D) TACAS server 192.168.1.100



5. A security auditor is performing a vulnerability scan to find out if mobile applications used in the organization are secure. The auditor discovers that one application has been accessed remotely with no legitimate account credentials. After investigating,it seems the application has allowed some users to bypass authentication of that application. Which of the following types of malware allow such a compromise to take place? (Choose two.)(Select 2answers)

A) Ransomware
B) Trojan
C) RAT
D) Backdoor
E) Worm


1. Right Answer: A,D
Explanation:

2. Right Answer: D
Explanation:

3. Right Answer: F
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C,D
Explanation:

0 Comments

Leave a comment