Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ Module 1 - Fundamental Security Concepts

Rating
-
Sold
-
Pages
54
Grade
A+
Uploaded on
05-11-2025
Written in
2025/2026

CompTIA Security+ Module 1 - Fundamental Security Concepts

Institution
CompTIA Security+ Module 1 - Fundamental Security
Course
CompTIA Security+ Module 1 - Fundamental Security

Content preview

CompTIA Security+ Module 1 - Fundamental
Security Concepts




What are the non-overlapping channels for 802.11g/n? - answer-Channels 1, 6,
and 11


Does the S/MIME protocol use certificates? - answer-yes


Which two ports does FTP use? - answer-ports 20 and 21


Which technique attempts to predict the likelihood that a threat will occur and
assigns monetary values in the event a loss occurs? - answer-quantitative risk
analysis


Which IPSec mode is used to create a VPN between two gateways? - answer-
tunnel mode


What is the most likely cause of a single computer communicating with an
unknown IRC server and scanning other systems on the network? - answer-The
computer is infected with a botnet.

,What does the acronym IDS denote? - answer-Intrusion Detection System


Which encryption method is more scalable? - answer-Asymmetric Encryption


What is the purpose of DLP? - answer-Data Loss Prevention (DLP) is a network
system that monitors data on computers to ensure the data is not deleted or
removed.


Which port number does NTP use? - answer-port 123


Which backup method backs up every file on the server each time it is run? -
answer-A full backup


What is the term for an unauthorized access that a network-based intrusion
detection system (NIDS) fails to detect? - answer-missed detection or false
negative


Which alternate computing facility is the least expensive to maintain before a
disaster occurs? - answer-a cold site


What are the three basic questions answered by the chain of custody? -
answer-who controlled the evidence, who secured the evidence, and who
obtained the evidence


Which term refers to the assurance that data has not been altered in
transmission? - answer-data integrity


What is the purpose of Platform as a Service (PaaS) in cloud computing? -
answer-It provides not only a virtualized deployment platform but also a value-
added solution stack and an application development platform.

,What does the acronym FCoE denote? - answer-Fibre Channel over Ethernet


At which OSI layer does IP Security (IPSec) operate? - answer-the Network
layer (Layer 3)


What is meant by the term hardening? - answer-tightening control using
security policies to increase system security


What do you use to control traffic from the Internet to the LAN (local area
network) by controlling the packets that are allowed to enter the LAN? -
answer-a firewall


According to CompTIA's Security+ examination blueprint, what are the four
types of logs that you should monitor for mitigation and deterrence? - answer-
event logs, audit logs, security logs, and access logs


What are the two types of eye scans? - answer-iris scans and retinal scans


What are alternate terms for cross-site request forgery (XSRF)? - answer-
session riding or one-click attack


What block cipher and key size (in bits) are used by the Clipper Chip? - answer-
The Skipjack block cipher and an 80-bit key length


Why is GPS tracking often disabled? - answer-It is considered a security threat.
As long as GPS tracking is enabled and the mobile device is powered on, the
device (and possibly its user) can be located.

, What is the name of the process for removing only the incriminating data from
the audit logs? - answer-scrubbing


What ensures that a user is who he claims to be? - answer-identification


Which port number does SSH use? - answer-port 22


On what does the Pretty Good Privacy (PGP) mail standard rely? - answer-a
web of trust


Which information do routers use to forward packets to their destinations? -
answer-the network address and subnet mask


Which account should you rename immediately after installing a new
operating system (OS) to harden the OS? - answer-the administrator account


Which error condition arises because data is not checked before input to
ensure that it has an appropriate length? - answer-buffer overflow errors


What is the component included with Windows Vista and higher operating
systems that encrypts an entire volume with 128-bit encryption to prevent
information from being read if the drive is lost or stolen? - answer-BitLocker


What is the purpose of administrative controls? - answer-to implement
security policies based on procedures, standards, and guidelines


Which fire suppression method, formerly used to suppress fires involving
electrical equipment or liquids, has been discontinued? - answer-halon gas

Written for

Institution
CompTIA Security+ Module 1 - Fundamental Security
Course
CompTIA Security+ Module 1 - Fundamental Security

Document information

Uploaded on
November 5, 2025
Number of pages
54
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$25.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
WORLDNURSE Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
178
Member since
2 year
Number of followers
44
Documents
4106
Last sold
2 hours ago
STUDY TOP EXAMS

.Welcome to my academic support store, your trusted destination for top-tier homework help and tutoring services! Specializing in key subjects like Psychology, Nursing, Human Resource Management, and Mathematics, I’m dedicated to helping students excel with high-quality, meticulously crafted resources. My mission is to deliver scholarly, reliable content that guarantees excellent grades, earning me a reputation as one of Stuvia’s BEST GOLD RATED TUTORS. Whether you need assistance with quizzes, exams, or detailed study materials, I prioritize your success with a commitment to academic excellence and results you can count on.

Read more Read less
5.0

2362 reviews

5
2326
4
13
3
9
2
5
1
9

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions