100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CompTIA CertMaster CE Security Exam and Knowledge Assessment and Continuing Education Resource for IT Security Professionals| INSTANT PDF DOWNLOAD

Puntuación
-
Vendido
-
Páginas
39
Grado
A+
Subido en
08-01-2026
Escrito en
2025/2026

CompTIA CertMaster CE Security Exam and Knowledge Assessment and Continuing Education Resource for IT Security Professionals| INSTANT PDF DOWNLOAD

Institución
CompTIA CertMaster CE Security
Grado
CompTIA CertMaster CE Security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA CertMaster CE Security
Grado
CompTIA CertMaster CE Security

Información del documento

Subido en
8 de enero de 2026
Número de páginas
39
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CompTIA CertMaster CE Security Exam and
Knowledge Assessment and Continuing Education
Resource for IT Security Professionals| INSTANT PDF
DOWNLOAD

Question 1:
Which of the following best describes the principle of least privilege?
A) Users should have access to all systems at all times.
B) Users are given only the access necessary to perform their job functions.
C) Administrators must always review all system logs.
D) Users should change passwords every 90 days.
Answer: B
Rationale:
The principle of least privilege ensures that users only have the minimum level of
access necessary to perform their tasks, reducing the risk of accidental or
malicious misuse of resources.


Question 2:
A security analyst notices unusual outbound traffic from an internal server to an
external IP. Which of the following is the most likely cause?
A) Normal system updates
B) Malware or data exfiltration
C) Scheduled backup
D) VPN connectivity
Answer: B
Rationale:
Unusual outbound traffic is often a sign of malware attempting to exfiltrate data
or communicate with a command-and-control server. Analysts should investigate
unusual traffic patterns immediately.

,Question 3:
Which of the following is a primary goal of a firewall?
A) Encrypt all internal network traffic
B) Monitor system hardware health
C) Control incoming and outgoing network traffic based on predefined rules
D) Perform vulnerability scanning on endpoints
Answer: C
Rationale:
A firewall is a network security device designed to filter traffic based on security
rules, controlling what enters or leaves a network.


Question 4:
Which type of attack involves an attacker intercepting communication between
two parties to read or modify the messages?
A) Phishing
B) Man-in-the-Middle (MITM)
C) SQL Injection
D) Denial of Service
Answer: B
Rationale:
A MITM attack occurs when an attacker secretly intercepts or alters
communication between two parties without their knowledge, often to steal data
or credentials.


Question 5:
Which of the following is considered multi-factor authentication (MFA)?
A) Password only
B) Password and fingerprint scan
C) Security question only
D) Username only

,Answer: B
Rationale:
MFA requires two or more independent credentials: something you know
(password), something you have (token), or something you are (biometric),
enhancing account security.


Question 6:
Which of the following is a common indicator of a phishing email?
A) Email from a known internal contact
B) Request to verify account information through a suspicious link
C) Properly spelled company domain name
D) Signed by the company’s CEO in a standard email signature
Answer: B
Rationale:
Phishing emails often include urgent requests to click links or provide personal
information. Users should verify the sender and avoid clicking suspicious links.


Question 7:
A company wants to ensure that sensitive files are not readable if stolen. Which
security control should they implement?
A) Data encryption
B) Antivirus software
C) Firewall
D) Network segmentation
Answer: A
Rationale:
Encryption converts data into a form that is unreadable without the correct
decryption key, protecting sensitive information from unauthorized access even if
the files are stolen.

, Question 8:
Which of the following is a type of social engineering attack?
A) SQL Injection
B) Brute-force attack
C) Tailgating
D) DDoS attack
Answer: C
Rationale:
Tailgating occurs when an attacker gains physical access to a secured area by
following someone with authorized access. Social engineering exploits human
behavior rather than technical vulnerabilities.


Question 9:
Which security principle ensures that users cannot deny having performed an
action?
A) Confidentiality
B) Integrity
C) Availability
D) Non-repudiation
Answer: D
Rationale:
Non-repudiation provides proof of the origin of data or actions, ensuring that
users cannot deny their involvement, often implemented through digital
signatures or logging.


Question 10:
Which of the following best describes a zero-day vulnerability?
A) A known vulnerability with a published patch
B) A vulnerability that has been exploited publicly before a patch is available
C) A vulnerability that has been mitigated with antivirus software
D) A vulnerability in an outdated operating system only
$25.50
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
studyguidepro NURSING
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
68
Miembro desde
4 meses
Número de seguidores
4
Documentos
1414
Última venta
5 horas hace
verified exams

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

18 reseñas

5
10
4
1
3
4
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes