100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA CertMaster CE Security Exam and Knowledge Assessment and Continuing Education Resource for IT Security Professionals| INSTANT PDF DOWNLOAD

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
08-01-2026
Written in
2025/2026

CompTIA CertMaster CE Security Exam and Knowledge Assessment and Continuing Education Resource for IT Security Professionals| INSTANT PDF DOWNLOAD

Institution
CompTIA CertMaster CE Security
Course
CompTIA CertMaster CE Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA CertMaster CE Security
Course
CompTIA CertMaster CE Security

Document information

Uploaded on
January 8, 2026
Number of pages
39
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA CertMaster CE Security Exam and
Knowledge Assessment and Continuing Education
Resource for IT Security Professionals| INSTANT PDF
DOWNLOAD

Question 1:
Which of the following best describes the principle of least privilege?
A) Users should have access to all systems at all times.
B) Users are given only the access necessary to perform their job functions.
C) Administrators must always review all system logs.
D) Users should change passwords every 90 days.
Answer: B
Rationale:
The principle of least privilege ensures that users only have the minimum level of
access necessary to perform their tasks, reducing the risk of accidental or
malicious misuse of resources.


Question 2:
A security analyst notices unusual outbound traffic from an internal server to an
external IP. Which of the following is the most likely cause?
A) Normal system updates
B) Malware or data exfiltration
C) Scheduled backup
D) VPN connectivity
Answer: B
Rationale:
Unusual outbound traffic is often a sign of malware attempting to exfiltrate data
or communicate with a command-and-control server. Analysts should investigate
unusual traffic patterns immediately.

,Question 3:
Which of the following is a primary goal of a firewall?
A) Encrypt all internal network traffic
B) Monitor system hardware health
C) Control incoming and outgoing network traffic based on predefined rules
D) Perform vulnerability scanning on endpoints
Answer: C
Rationale:
A firewall is a network security device designed to filter traffic based on security
rules, controlling what enters or leaves a network.


Question 4:
Which type of attack involves an attacker intercepting communication between
two parties to read or modify the messages?
A) Phishing
B) Man-in-the-Middle (MITM)
C) SQL Injection
D) Denial of Service
Answer: B
Rationale:
A MITM attack occurs when an attacker secretly intercepts or alters
communication between two parties without their knowledge, often to steal data
or credentials.


Question 5:
Which of the following is considered multi-factor authentication (MFA)?
A) Password only
B) Password and fingerprint scan
C) Security question only
D) Username only

,Answer: B
Rationale:
MFA requires two or more independent credentials: something you know
(password), something you have (token), or something you are (biometric),
enhancing account security.


Question 6:
Which of the following is a common indicator of a phishing email?
A) Email from a known internal contact
B) Request to verify account information through a suspicious link
C) Properly spelled company domain name
D) Signed by the company’s CEO in a standard email signature
Answer: B
Rationale:
Phishing emails often include urgent requests to click links or provide personal
information. Users should verify the sender and avoid clicking suspicious links.


Question 7:
A company wants to ensure that sensitive files are not readable if stolen. Which
security control should they implement?
A) Data encryption
B) Antivirus software
C) Firewall
D) Network segmentation
Answer: A
Rationale:
Encryption converts data into a form that is unreadable without the correct
decryption key, protecting sensitive information from unauthorized access even if
the files are stolen.

, Question 8:
Which of the following is a type of social engineering attack?
A) SQL Injection
B) Brute-force attack
C) Tailgating
D) DDoS attack
Answer: C
Rationale:
Tailgating occurs when an attacker gains physical access to a secured area by
following someone with authorized access. Social engineering exploits human
behavior rather than technical vulnerabilities.


Question 9:
Which security principle ensures that users cannot deny having performed an
action?
A) Confidentiality
B) Integrity
C) Availability
D) Non-repudiation
Answer: D
Rationale:
Non-repudiation provides proof of the origin of data or actions, ensuring that
users cannot deny their involvement, often implemented through digital
signatures or logging.


Question 10:
Which of the following best describes a zero-day vulnerability?
A) A known vulnerability with a published patch
B) A vulnerability that has been exploited publicly before a patch is available
C) A vulnerability that has been mitigated with antivirus software
D) A vulnerability in an outdated operating system only

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
studyguidepro NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
68
Member since
4 months
Number of followers
4
Documents
1414
Last sold
7 hours ago
verified exams

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

18 reviews

5
10
4
1
3
4
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions