100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

COMPTIA SECURITY+ CERTIFICATION EXAM PRACTICE QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
13-11-2025
Written in
2025/2026

COMPTIA SECURITY+ CERTIFICATION EXAM PRACTICE QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Institution
COMPTIA SECURITY+ CERTIFICATION
Course
COMPTIA SECURITY+ CERTIFICATION










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
COMPTIA SECURITY+ CERTIFICATION
Course
COMPTIA SECURITY+ CERTIFICATION

Document information

Uploaded on
November 13, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

COMPTIA SECURITY+ CERTIFICATION
EXAM PRACTICE QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) PLUS RATIONALES 2026
Q&A | INSTANT DOWNLOAD PDF

1. Which type of attack involves sending fraudulent emails that
appear to come from a legitimate source?
Phishing
Phishing attacks attempt to trick users into revealing sensitive
information by impersonating a trusted entity.
2. What protocol is commonly used to secure web traffic?
HTTPS
HTTPS uses SSL/TLS to encrypt data transmitted between a client
and server.
3. Which type of malware restricts access to files until a ransom is
paid?
Ransomware
Ransomware encrypts files and demands payment for the
decryption key.
4. What is the primary purpose of a firewall?
To filter incoming and outgoing network traffic based on security
rules
Firewalls act as a barrier between trusted and untrusted networks.

,5. Which attack attempts to overwhelm a system by flooding it with
traffic?
Denial-of-Service (DoS)
A DoS attack aims to make a service unavailable to legitimate
users.
6. Which principle ensures that users have only the access necessary
to perform their job?
Principle of least privilege
Limiting access reduces the potential impact of a compromised
account.
7. What is the best method to prevent password-based attacks?
Use multi-factor authentication (MFA)
MFA adds an extra layer of security beyond just passwords.
8. Which security model uses classification levels like Top Secret and
Secret?
Bell-LaPadula
The Bell-LaPadula model focuses on maintaining data
confidentiality.
9. Which type of malware can replicate itself without user
interaction?
Worm
Worms spread automatically through networks without needing
host files.
10. What is the main difference between a virus and a worm?
A virus requires user action to spread, while a worm spreads
automatically
Viruses attach to files, while worms exploit network vulnerabilities.

, 11. Which tool is used to detect vulnerabilities in a network?
Vulnerability scanner
Vulnerability scanners identify weaknesses in systems before
attackers exploit them.
12. Which type of attack manipulates DNS responses to redirect
traffic?
DNS spoofing
Attackers alter DNS responses to send users to malicious sites.
13. What is the purpose of a DMZ in network architecture?
To isolate public-facing services from internal networks
A DMZ reduces risk to the internal network by providing a buffer
zone.
14. Which type of backup captures only files that have changed
since the last backup?
Incremental backup
Incremental backups save storage space by backing up only
modified files.
15. Which protocol is used for secure remote administration?
SSH (Secure Shell)
SSH encrypts remote connections, unlike Telnet which is
unencrypted.
16. What is the primary goal of social engineering attacks?
To manipulate individuals into revealing confidential
information
Social engineering exploits human behavior rather than technical
vulnerabilities.
17. Which access control model is based on user roles rather
than individual permissions?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
YouTubes Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
2 months
Number of followers
0
Documents
1839
Last sold
1 week ago

4.8

5 reviews

5
4
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions