100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CertMaster Security+ by CompTIA – Exam Questions with Verified Correct Solutions (2026 Edition)

Rating
-
Sold
-
Pages
48
Grade
A+
Uploaded on
02-12-2025
Written in
2025/2026

This document provides a complete set of exam-style practice questions for CertMaster Security+ by CompTIA, updated for the 2026 certification cycle. It includes verified correct solutions designed to reinforce mastery across all Security+ domains, including threats and vulnerabilities, architecture and design, implementation, operations, incident response, governance, and compliance. The material reflects the style and difficulty of CertMaster-based assessments, offering detailed explanations that support thorough exam readiness and strong conceptual understanding.

Show more Read less
Institution
CERTMASTER SECURITY BY COMPTIA
Course
CERTMASTER SECURITY BY COMPTIA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CERTMASTER SECURITY BY COMPTIA
Course
CERTMASTER SECURITY BY COMPTIA

Document information

Uploaded on
December 2, 2025
Number of pages
48
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CERTMASTER SECURITY BY COMPTIA | EXAM
QUESTIONS AND VERIFIED SOLUTIONS 2026

◉ Spear phishing. Answer: a phishing expedition in which the emails
are carefully designed to target a particular person or organization


◉ Privacy Filter. Answer: security control that allows only the user
to see the screen contents, thus preventing shoulder surfing.


◉ colocation. Answer: data center provide space, power, backup, etc.
for servers and network equipment of other firms


◉ whaling. Answer: Spear phishing that focuses on one specific high
level executive or team


◉ watering hole attack. Answer: A malicious attack that is directed
toward a small group of specific individuals who visit the same
website.


◉ pharming attack. Answer: passive means of redirecting users from
a legit website to a malicious one

,◉ credential harvesting. Answer: Social engineering techniques for
gathering valid credentials to use to gain unauthorized access.


◉ Typosquatting. Answer: A form of cybersquatting that relies on
mistakes, such as typographical errors, made by Internet users when
inputting information into a Web browser.


◉ piggy backing. Answer: Similar to tailgating, this is a situation
where the attacker enters a secure area with an employee's
permission


◉ vishing. Answer: Phishing attacks committed using telephone
calls or VoIP systems.


◉ Consensus/Social Proof. Answer: An attacker fools users into
believing that a malicious website is legit by posting fake reviews.


◉ Familiarity and Liking. Answer: Low risk


◉ Authority and Intimidation. Answer: High risk


◉ hoax attack. Answer: an email alert or web pop-up will claim to
have identified some sort of security problem, like a virus infection,

,and offer a tool to fix the problem, but the tool will be some sort of
Trojan application.


◉ rogueware. Answer: Fake antivirus software. Also called
scareware or ransomware.


◉ kiting. Answer: the act of continually registering, deleting, and
reregistering a name within the five-day grace period without
having to pay for it.


◉ tasting. Answer: A DNS exploit that involves registering a domain
temporarily to see how many hits it generates within the five-day
grace period.


◉ Rainbow Tables. Answer: Large pregenerated data sets of
encrypted passwords used in password attacks.


◉ PSK (pre-shared key). Answer: A value (key)
shared with another party so that
they can encrypt messages to then
be securely sent.


◉ Birthday Attack. Answer: a probability method of finding a
collision in a hash function

, ◉ Pass the Hash Attack. Answer: An expoit in which an attacker
steals a hashed user credential and, without cracking it, reuses it to
trick an authentication system into creating a new authenticated
session on the same network.


◉ downgrade attack. Answer: An attack in which the system is
forced to abandon the current higher security mode of operation
and fall back to implementing an older and less secure mode.


◉ man-in-the-middle attack. Answer: A form of eavesdropping
where the attacker makes an independent connection between two
victims and steals information to use fraudulently.


◉ RAT (Remote Access Trojan). Answer: Functions as a backdoor
and allows the attacker to access the PC, upload files, and install
software on it.


◉ Skimmers. Answer:


◉ Command and Control Host. Answer: A network that can manage
and control various bots remotely


◉ Computer bots. Answer: Computers that the attacker has infected
with a backdoor exploit with a connection to the C2 host or network

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Puresilver4 stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
67
Member since
1 year
Number of followers
0
Documents
1376
Last sold
2 days ago
PASS SILVER

EXAMS practice with verified and correct answers pass grade A+ SILVER PASSI have Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology And All Other Subjects A+ solutions A+ SOLUTIONS FOR FELLOW STUDENTS Nursing Being my main profession line, My mission is to be your LIGHT in the dark. If you're worried or having trouble in nursing school, I really want my notes to be your guide! I know they have helped countless others get through and that's all I want for YOU! I have essential Study guides that are Almost A+ graded, I am a very friendly person: Solutions SolutionsStuvia

Read more Read less
4.1

11 reviews

5
6
4
0
3
5
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions