Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 7

Mary Smith

Tue, 18 Nov 2025

ComptiA Security+ Certification Exam Questions and answer - Part 7

1. After a routine audit,a company discovers that engineering documents have been leaving the network on a particular port. The company must allow outbound traffic on this port,as it has a legitimate business use. Blocking the port would cause an outage. Which of the following technology controls should the company implement?

A) Web proxy
B) ACL
C) NAC
D) DLP



2. A consultant has been tasked to assess a client's network. The client reports frequent network outages. Upon viewing the spanning tree configuration,the consultant notices that an old and law performing edge switch on the network has been elected to be the root bridge. Which of the following explains this scenario?

A) The switch has the lowest MAC address
B) The switch has spanning tree loop protection enabled
C) The switch has the fastest uplink port
D) The switch also serves as the DHCP server



3. A company wants to implement a wireless network with the following requirements: All wireless users will have a unique credential. User certificates will not be required for authentication. The company - s AAA infrastructure must be utilized. Local hosts should not store authentication tokens. Which of the following should be used in the design to meet the requirements?

A) PEAP
B) WPS
C) PSK
D) EAP-TLS



4. A forensic investigator has run into difficulty recovering usable files from a SAN drive. Which of the following SAN features might have caused the problem?

A) Storage multipaths
B) Data snapshots
C) Deduplication
D) iSCSI initiator encryption



5. A company has a team of penetration testers. This team has located a file on the company file server that they believe contains cleartext usernames followed by a hash. Which of the following tools should the penetration testers use to learn more about the content of this file?

A) Exploitation framework
B) Password cracker
C) Netcat
D) Vulnerability scanner



1. Right Answer: D
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: A
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment