CompTIA Security+ Study Guide
Exam 2025 Questions and Answers
A security administrator is implementing a security program that addresses confidentiality and
availability. What else should the administrator include? - ANSWER✔✔-Ensure systems are not
susceptible to unauthorized changes
You need to transmit PII via email and you want to maintain its confidentiality. What is the BEST
solution? - ANSWER✔✔-Encrypt it before sending
Lisa manages network devices in your organization and maintains copies of the configuration filed
for all the managed routers and switches. On a weekly basis, she creates hashes for these files and
compares them with hashes she created on the same files the previous week. Which security goal is
she pursuing? - ANSWER✔✔-Integrity
An organization wants to provide protection against malware attacks. Administrators have installed
antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the
network. Which of the following BEST identifies this principal? - ANSWER✔✔-Layered security
Homer called into the help desk and says he forgot his password. Which of the following choices is
the BEST choice for what the help-desk professional should do? - ANSWER✔✔-Reset the
password and configure the password to expire after the first use.
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
, Which type of authentication does a hardware token provide? - ANSWER✔✔-One-time password
Which type of authentication is a retina scan? - ANSWER✔✔-Biometric
Users are required to log on to their computers with a smart card and a PIN. Which BEST describes
this? - ANSWER✔✔-Multifactor authentication
Your company recently began allowing workers to telecommute from home one or more days a
week. However, your company doesn't currently have a remote access solution. They want to
implement an AAA solution that supports different vendors. Which is the BEST choice? -
ANSWER✔✔-RADIUS
Your organization has implemented a system that stores user credentials in a central database. Users
log on once with their credentials. They can then access other systems in the organization without
logging on again. What does this describe? - ANSWER✔✔-Single sign-on
Your organization issues users a variety of different mobile devices. However, management want to
reduce potential data losses if the devices are lost or stolen. Which is the BEST technical control to
achieve this goal? - ANSWER✔✔-Disk encryption
- ANSWER✔✔-Mantrap
An outside security auditor recently completed an in-depth security audit on your network. One of
the issues he reported was related to passwords. Specifically, he found the following passwords used
on the network: Pa$$, 1@W2, and G7bT3. What should be change to avoid the problem shown
with these passwords? - ANSWER✔✔-Password length
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2
Exam 2025 Questions and Answers
A security administrator is implementing a security program that addresses confidentiality and
availability. What else should the administrator include? - ANSWER✔✔-Ensure systems are not
susceptible to unauthorized changes
You need to transmit PII via email and you want to maintain its confidentiality. What is the BEST
solution? - ANSWER✔✔-Encrypt it before sending
Lisa manages network devices in your organization and maintains copies of the configuration filed
for all the managed routers and switches. On a weekly basis, she creates hashes for these files and
compares them with hashes she created on the same files the previous week. Which security goal is
she pursuing? - ANSWER✔✔-Integrity
An organization wants to provide protection against malware attacks. Administrators have installed
antivirus software on all computers. Additionally, they implemented a firewall and an IDS on the
network. Which of the following BEST identifies this principal? - ANSWER✔✔-Layered security
Homer called into the help desk and says he forgot his password. Which of the following choices is
the BEST choice for what the help-desk professional should do? - ANSWER✔✔-Reset the
password and configure the password to expire after the first use.
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1
, Which type of authentication does a hardware token provide? - ANSWER✔✔-One-time password
Which type of authentication is a retina scan? - ANSWER✔✔-Biometric
Users are required to log on to their computers with a smart card and a PIN. Which BEST describes
this? - ANSWER✔✔-Multifactor authentication
Your company recently began allowing workers to telecommute from home one or more days a
week. However, your company doesn't currently have a remote access solution. They want to
implement an AAA solution that supports different vendors. Which is the BEST choice? -
ANSWER✔✔-RADIUS
Your organization has implemented a system that stores user credentials in a central database. Users
log on once with their credentials. They can then access other systems in the organization without
logging on again. What does this describe? - ANSWER✔✔-Single sign-on
Your organization issues users a variety of different mobile devices. However, management want to
reduce potential data losses if the devices are lost or stolen. Which is the BEST technical control to
achieve this goal? - ANSWER✔✔-Disk encryption
- ANSWER✔✔-Mantrap
An outside security auditor recently completed an in-depth security audit on your network. One of
the issues he reported was related to passwords. Specifically, he found the following passwords used
on the network: Pa$$, 1@W2, and G7bT3. What should be change to avoid the problem shown
with these passwords? - ANSWER✔✔-Password length
FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2