100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ CertMaster CE – Complete Exam Questions and Answers (2025 Edition)

Rating
1.0
(1)
Sold
4
Pages
8
Grade
A+
Uploaded on
05-05-2025
Written in
2024/2025

This document provides a comprehensive set of verified questions and correct answers for the 2025 edition of the CompTIA Security+ CertMaster CE exam. It includes realistic scenario-based questions covering malware types, network threats, authentication methods, scripting attacks, and system vulnerabilities. Ideal for students and professionals preparing for certification renewal or initial Security+ certification.

Show more Read less
Institution
CompTIA
Course
CompTIA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
May 5, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Sec+ Certmaster CE Question With 100%
Correct Answers
A user used an administrator account to download and install a software application.
After the user launched the .exe extension installer file, the user experienced frequent
crashes, slow computer performance, and strange new services running when turning
on the computer. It seems like there are more and more services running over time.
What most likely happened to cause these issues? - ✔✔ - The user installed Trojan
horse malware.


A security operations center (SOC) analyst investigates the propagation of a memory-
resident virus across the network and notices a rapid consumption of network
bandwidth, causing a Denial of Service (DoS). What type of virus is this? - ✔✔ - A worm


A user purchased a laptop from a local computer shop. After powering on the laptop for
the first time, the user noticed a few programs like Norton Antivirus asking for
permission to install. How would an IT security specialist classify these programs? - ✔✔
- PUP


A fileless malicious software can replicate between processes in memory on a local
host or over network shares. What other behaviors and techniques would classify
malware as fileless rather than a normal virus? (Select all that apply.) - ✔✔ - -Uses
lightweight shellcode
-Uses low observable characteristic attacks


An attacker is planning to set up a backdoor that will infect a set of specific computers at
an organization, to inflict a set of other intrusion attacks remotely. Which of the following
will support the attackers' plan? (Select all that apply.) - ✔✔ - -Computer Bots
-Command & Control

, If a user's computer becomes infected with malware and used as part of a botnet, which
of the following actions can be initiated by the attacker? (Select all that apply.) - ✔✔ - -
Launch a Distributed Denial of Service (DDoS) attack
-Launch a mass-mail spam attack
-Establish a connection with a Command and Control server


If a user's device becomes infected with crypto-malware, which of the following would
have been the best way to mitigate this compromise? - ✔✔ - Have up-to-date backups.


A security specialist discovers a malicious script on a computer. The script is set to
execute if the administrator's account becomes disabled. What type of malware did the
specialist discover? - ✔✔ - A logic bomb


End-users at an organization contact the cybersecurity department and report that, after
downloading a file, they are being redirected to shopping websites to which they did not
intend to navigate, and built-in webcams turn on. The security team confirms the issue
as malicious, and notes modified DNS (Domain Name System) queries that go to
nefarious websites hosting malware. What most likely happened to the users'
computers? - ✔✔ - Spyware infected the computers.


An attacker installs Trojan malware that can execute remote backdoor commands, such
as the ability to upload files and install software to a victim PC. What type of Trojan
malware is this? - ✔✔ - A Remote Access Trojan (RAT)


A hacker is trying to gain remote access to a company computer by trying brute force
password attacks using a few common passwords in conjunction with multiple
usernames. What specific type of password attack is the hacker most likely performing?
- ✔✔ - Password spraying attack

Reviews from verified buyers

Showing all reviews
2 months ago

there are only a few questions and it does not cover the entire exam

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PrepMaster NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
116
Member since
8 months
Number of followers
11
Documents
1600
Last sold
5 days ago
ExamZen

A GOLD-TOP RATED SELLER ON STUVIA WITH WELL DETAILED AND VERIFIED STUDY DOCUMENTS ASSURED WITH EXCELLENT AND REMARKABLE RESULTS. Welcome to ExamZen, your go-to source for high-quality test banks and study materials designed to help you excel academically. We offer a comprehensive range of resources including test banks, study guides, solution manuals, and other study materials, all meticulously curated to ensure accuracy and effectiveness. Our affordable, instantly accessible materials are complemented by excellent customer support, making your learning experience seamless and efficient. Trust ExamZen to be your partner in academic success, providing the tools you need to achieve your educational goals.

Read more Read less
4.8

298 reviews

5
262
4
27
3
2
2
2
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions