Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 55

Mary Smith

Sat, 24 May 2025

ComptiA Security+ Certification Exam Questions and answer - Part 55

1. A security analyst is performing a quantitative risk analysis. The risk analysis should show the potential monetary loss each time a threat or event occurs. Given this requirement,which of the following concepts would assist the analyst in determining this value? (Select two.)(Select 2answers)

A) ALE
B) ROI
C) EF
D) ARO
E) AV


2. During an application design,the development team specifics a LDAP module for single sign-on communication with the company's access control database. This is an example of which of the following?

A) Authentication
B) Application control
C) Identification
D) Data in-transit



3. A technician is configuring a wireless guest network. After applying the most recent changes the technician finds the new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network. Which of the following security measures did the technician MOST likely implement to cause this Scenario?

A) Implementation of MAC filtering
B) Deactivation of SSID broadcast
C) Activation of 802.1X with RADIUS
D) Beacon interval was decreased
E) Reduction of WAP signal output power


4. Due to regulatory requirements,server in a global organization must use time synchronization. Which of the following represents the MOST secure method of time synchronization?

A) The server should connect to internal Stratum 0 NTP servers for synchronization
B) The server should connect to external Stratum 0 NTP servers for synchronization
C) The server should connect to external Stratum 1 NTP servers for synchronization
D) The server should connect to external Stratum 1 NTP servers for synchronization



5. A user needs to transmit confidential information to a third party. Which of the following should be used to encrypt the message?

A) SSL
B) SHA-2
C) AES
D) RSA



1. Right Answer: A,D
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: B
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment