Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 59

Mary Smith

Mon, 17 Mar 2025

ComptiA Security+ Certification Exam Questions and answer - Part 59

1. A water utility company has seen a dramatic increase in the number of water pumps burning out. A malicious actor was attacking the company and is responsible for the increase. Which of the following systems has the attacker compromised?

A) DMZ
B) SCADA
C) IoT
D) RTOS



2. In determining when it may be necessary to perform a credentialed scan against a system instead of a non-credentialed scan,which of the following requirements is MOST likely to influence this decision?

A) The scanner must be able to audit file system permissions
B) The scanner must be able to check for open ports with listening services.
C) The scanner must be able to enumerate the host OS of devices scanned.
D) The scanner must be able to footprint the network.



3. Company XYZ has decided to make use of a cloud-based service that requires mutual,certificate- based authentication with its users. The company uses SSL- inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication?

A) Use of smartcards that store x.509 keys,signed by a global CA
B) Use of a third-party,SAML-based authentication service for attestation
C) Use of OATH between the user and the service and attestation from the company domain
D) Use of active directory federation between the company and the cloud-based service



4. During a third-party audit,it is determined that a member of the firewall team can request,approve,and implement a new rule-set on the firewall. Which of the following will the audit team most l likely recommend during the audit out brief?

A) Separation of duties policy for the firewall team
B) Mandatory access control for the firewall team
C) Discretionary access control for the firewall team
D) Least privilege for the firewall team



5. Joe,a user,wants to send Ann,another user,a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping?

A) Encrypt it with Ann - s public key
B) Encrypt it with Joe - s public key
C) Encrypt it with Ann - s private key
D) Encrypt it with Joe - s private key



1. Right Answer: B
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: D
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: A
Explanation:

0 Comments

Leave a comment