100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ Section 1: Overview of Security Exam 2025 Questions and Answers

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
01-06-2025
Written in
2024/2025

CompTIA Security+ Section 1: Overview of Security Exam 2025 Questions and Answers

Institution
CompTIA
Course
CompTIA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
June 1, 2025
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CompTIA Security+ Section 1:
Overview of Security Exam 2025
Questions and Answers


Information Security - ANSWER✔✔-Protecting data and information from unauthorized access,

unlawful modification, and disruption, disclosure, corruption, and destruction.


Information Systems Security - ANSWER✔✔-Protecting the systems that hold and process our

critical data (can be a computer, server, network device, cell phone, etc.).


CIA Triad - ANSWER✔✔-Confidentiality, Integrity, Availability -- (without all three, there is a

vulnerability that can be exploited. when all three are present, our information has good security).


Confidentiality - ANSWER✔✔-Ensures that unauthorized entities cannot access data. Encryption

and access controls help to protect against loss of this.


Integrity - ANSWER✔✔-Provides assurance that data or system configurations have not been

modified. Audit Logs and hashing are two methods used to ensure this.




Ensures that the information has not been modified or altered without proper authorization.




FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1

, Availability - ANSWER✔✔-Ensures that systems and data are up and operational when needed.




Ensures that the information is able to be stored, accessed, and protected at all times.


AAA of Security - ANSWER✔✔-Authentication, Authorization, Accounting


Authentication - ANSWER✔✔-The process that occurs when a user proves an identity, such as

with a password.




When a person's identity is established with proof and confirmed by a system (ex. 2FA)


5 Methods of Authentication - ANSWER✔✔-1. Something you know


2. Something you are

3. Something you have

4. Something you do

5. Somewhere you are


Authorization - ANSWER✔✔-The process of granting access to resources for users who prove

their identity (such as with a username and password), based on their proven identity.




Occurs when a user is given access to a certain piece of data or certain areas of a building.




FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EmilyCharlene Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
447
Member since
2 year
Number of followers
138
Documents
21009
Last sold
1 day ago
Charlene\'s Scholastic Emporium.

Your Actual and Virtual Exam Tests Excellent Tutor.

3.7

98 reviews

5
46
4
13
3
15
2
7
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions