CompTIA Security+ Exam Prep - Question List

Select how would you like to study

301. When designing security measures to protect assets, there are a number of variables that must be considered. What situation is the hardest to protect against?
  1. Security Surfing
  2. Perimeter Testing
  3. Social Engineering
  4. Perimeter Surfing
302. Paul is talking to his employees about threat agents. What item is not a threat agent?
  1. Malware
  2. Users
  3. Rain
  4. Contractor
303. April’s computer is acting strange. She keeps trying to find information that she worked on yesterday, but the computer keeps displaying the incorrect information. She thinks the problem is with the memory of the hardware. Where does April think the problem is?
  1. Central Access Unit
  2. System Access Unit
  3. Central Processing Unit
  4. System Processing Unit
304. Jack is fooled by a person who introduces himself as new IT staff in his organization. On the person’s request, Jack reveals the web server login details. Later he comes to know that the person was a fraud and confidential data has been stolen from the web server. What kind of attack has Jack encountered?
  1. Man in the middle
  2. Eavesdropping
  3. Smurf
  4. Social Engineering
305. What is the difference between a computer-assisted crime and a computer-targeted crime?
  1. In computer assisted crime, a computer is used as a tool
  2. In computer assisted crime, a computer is a victim
  3. Both A and B
  4. Neither A nor B

Select how would you like to study