100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

COMPTIA SECURITY+ CERTIFICATION EXAM PRACTICE QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Puntuación
-
Vendido
-
Páginas
26
Grado
A+
Subido en
13-11-2025
Escrito en
2025/2026

COMPTIA SECURITY+ CERTIFICATION EXAM PRACTICE QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) PLUS RATIONALES 2026 Q&A | INSTANT DOWNLOAD PDF

Institución
COMPTIA SECURITY+ CERTIFICATION
Grado
COMPTIA SECURITY+ CERTIFICATION










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
COMPTIA SECURITY+ CERTIFICATION
Grado
COMPTIA SECURITY+ CERTIFICATION

Información del documento

Subido en
13 de noviembre de 2025
Número de páginas
26
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

COMPTIA SECURITY+ CERTIFICATION
EXAM PRACTICE QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) PLUS RATIONALES 2026
Q&A | INSTANT DOWNLOAD PDF

1. Which type of attack involves sending fraudulent emails that
appear to come from a legitimate source?
Phishing
Phishing attacks attempt to trick users into revealing sensitive
information by impersonating a trusted entity.
2. What protocol is commonly used to secure web traffic?
HTTPS
HTTPS uses SSL/TLS to encrypt data transmitted between a client
and server.
3. Which type of malware restricts access to files until a ransom is
paid?
Ransomware
Ransomware encrypts files and demands payment for the
decryption key.
4. What is the primary purpose of a firewall?
To filter incoming and outgoing network traffic based on security
rules
Firewalls act as a barrier between trusted and untrusted networks.

,5. Which attack attempts to overwhelm a system by flooding it with
traffic?
Denial-of-Service (DoS)
A DoS attack aims to make a service unavailable to legitimate
users.
6. Which principle ensures that users have only the access necessary
to perform their job?
Principle of least privilege
Limiting access reduces the potential impact of a compromised
account.
7. What is the best method to prevent password-based attacks?
Use multi-factor authentication (MFA)
MFA adds an extra layer of security beyond just passwords.
8. Which security model uses classification levels like Top Secret and
Secret?
Bell-LaPadula
The Bell-LaPadula model focuses on maintaining data
confidentiality.
9. Which type of malware can replicate itself without user
interaction?
Worm
Worms spread automatically through networks without needing
host files.
10. What is the main difference between a virus and a worm?
A virus requires user action to spread, while a worm spreads
automatically
Viruses attach to files, while worms exploit network vulnerabilities.

, 11. Which tool is used to detect vulnerabilities in a network?
Vulnerability scanner
Vulnerability scanners identify weaknesses in systems before
attackers exploit them.
12. Which type of attack manipulates DNS responses to redirect
traffic?
DNS spoofing
Attackers alter DNS responses to send users to malicious sites.
13. What is the purpose of a DMZ in network architecture?
To isolate public-facing services from internal networks
A DMZ reduces risk to the internal network by providing a buffer
zone.
14. Which type of backup captures only files that have changed
since the last backup?
Incremental backup
Incremental backups save storage space by backing up only
modified files.
15. Which protocol is used for secure remote administration?
SSH (Secure Shell)
SSH encrypts remote connections, unlike Telnet which is
unencrypted.
16. What is the primary goal of social engineering attacks?
To manipulate individuals into revealing confidential
information
Social engineering exploits human behavior rather than technical
vulnerabilities.
17. Which access control model is based on user roles rather
than individual permissions?
$21.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
YouTubes Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
21
Miembro desde
2 meses
Número de seguidores
0
Documentos
1839
Última venta
7 horas hace

4.8

5 reseñas

5
4
4
1
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes