CompTIA Security+ 2021

Currently seeing questions 1 - 5 out of 752
Currently on page 1 out of 151

Question 1Topic 1

SIMULATION -
A company recently added a DR site and is redesigning the network. Users at the DR site are having issues browsing websites.

INSTRUCTIONS -
Click on each firewall to do the following:
1. Deny cleartext web traffic.
2. Ensure secure management protocols are used.
3. Resolve issues at the DR site.
The ruleset order cannot be modified due to outside constraints.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




Question 2Topic 1

Which of the following tools is effective in preventing a user from accessing unauthorized removable media?

A. USB data blocker

B. Faraday cage

C. Proximity reader

D. Cable lock

Question 3Topic 1

A Chief Security Officer is looking for a solution that can provide increased scalability and flexibility for back-end infrastructure, allowing it to be updated and modified without disruption to services. The security architect would like the solution selected to reduce the back-end server resources and has highlighted that session persistence is not important for the applications running on the back-end servers. Which of the following would BEST meet the requirements?

A. Reverse proxy

B. Automated patch management

C. Snapshots

D. NIC teaming

Question 4Topic 1

Which of the following describes a social engineering technique that seeks to exploit a person's sense of urgency?

A. A phishing email stating a cash settlement has been awarded but will expire soon

B. A smishing message stating a package is scheduled for pickup

C. A vishing call that requests a donation be made to a local charity

D. A SPIM notification claiming to be undercover law enforcement investigating a cybercrime

Question 5Topic 1

A security analyst is reviewing application logs to determine the source of a breach and locates the following log: https://www.comptia.com/login.php?id='%20or%20'1'1='1
Which of the following has been observed?

A. DLL Injection

B. API attack

C. SQLi

D. XSS