CompTIA Security+ Exam Prep - Question List

Select how would you like to study

436. What is given in exchange for a fee when attacker uses ransomware?
  1. Decryption key
  2. Encryption key
  3. Encryption certificate
  4. Encryption license
437.
Which of the following is an example of a ransomware attack?
  1. An email is sent to a recipient to trick the individual into opening attachments which release malware.
  2. An email is sent to a recipient to trick the individual into opening attachments which result in files being locked up and encrypting them so the contents are not accessible to the owner of the files. Payment is demanded before access to the files can be regained.
  3. An employee of an organization copies files containing personal health information to their personal computer and provides unauthorized access to those files for personal gain.
  4. Both B and C.
438. You are having problems connecting to a client’s computer using a Remote Desktop connection. All other network services are working fine. Which of the following could be a possible reason for this?
  1. The DHCP server is down.
  2. The NIC is faulty.
  3. The firewall has blocked port 3389.
  4. The DNS server is down.
439.

Which protocol provides the encryption used over VPN?

  1. L2TP / UDP
  2. SSH
  3. PPP
  4. HTTPS
  5. None of the Above
440. Which of the following examines and recognizes different known attacks, as compared to a list of common attack signatures?
  1. IDS
  2. VPN
  3. Firewall
  4. NAT

Select how would you like to study