top of page

CompTIA Questions

Do you want to help Professor JROD with his research?
Click here
https://qfreeaccountssjc1.az1.qualtrics.com/jfe/form/SV_3eJ4L1Fcj5w9jBc


Join Technology Tap Premium, and you can be eligible to win one voucher for either CompTIA A+ (1101 or 1102), Network Plus, or Security Plus. We will hold a raffle on June 1st, August 1st, October 1st, and December 1st.
To qualify for a free voucher, you must be a Technology Tap Premium subscriber for at least three months. 

Only one voucher winner per household. 
Only one voucher per raffle date

https://www.buzzsprout.com/1473469/subscribe

Let's ask Questions

CompTIA Questions are critical thinking questions. You have to actually read the question 

Question 1

1. An employer requires that employees use a key-generating app on their smartphones to log into corporate applications. In terms of authentication of an individual, this type of access policy is BEST defined as:

​

A. Something you have 
B. Something you know
C. Something you do
D. Something you are

Question 2

Adhering to a layered security approach, a controlled access facility employs security guards who verify the authorization of all personnel entering the facility. Which of the following terms does BEST describe the security control being employed?

​

A. Administrative
B. Corrective
C. Deterrent
D. Compensating

Question 3

Which of the following are the MAIN reasons why a systems administrator would install security patches in a staging environment before the patches are applied to the production server? (Select two.)

​

A. To prevent server availability issues
B. To verify the appropriate patch is being installed
C. To generate a new baseline hash after patching
D. To allow users to test functionality

E. To ensure users are trained on new functionality

Question 4

A Chief Information Officer (CIO) drafts an agreement between the organization and its employees. The agreement outlines ramifications for releasing information without consent and/or approval. Which of the following BEST describes this type of agreement?

​

A. ISA
B. NDA
C. MOU
D. SLA

Question 5

1. A company wants to simplify the certificate management process. The company has a single domain with several dozen subdomains, all of which are publicly accessible on the internet. Which of the following BEST describes the type of certificate the company should implement?

​

A. Subject alternative name
B. Wildcard 
C. Self-signed
D. Domain validation

Question 6

Which of the following is an effective tool to stop or prevent the exfiltration of data from a network?

​

A. DLP
B. NIDS
C. TPM
D. FDE

Question 7

Several attempts have been made to pick the door lock of a secure facility. As a result, the security engineer has been assigned to implement a stronger preventative access control. Which of the following would BEST complete the engineer's assignment

​

A. Replacing the traditional key with an RFID key
B. Installing and monitoring a camera facing the door
C. Setting motion-sensing lights to illuminate the door on activity
D. Surrounding the property with fencing and gates

​

Question 8

Which of the following can be used by a monitoring tool to compare values and detect password leaks without providing the actual credentials?

​

A. Hashing
B. Tokenization
C. Masking
D. Encryption

Question 9

A user enters a username and a password at the login screen for a web portal. A few seconds later the following message appears on the screen:

Please use a combination of numbers, special characters, and letters in the password field. 

Which of the following concepts does this message describe?

​

A. Password complexity
B. Password reuse
C. Password history
D. Password age

Question 10

Which of the following is a reason to publish files' hashes?

​

A. To validate the integrity of the files
B. To verify if the software was digitally signed
C. To use the has as a software activation key
D. to use the hash a a decryption passphrase

Question11

A company is auditing the manner in which it's European customers' personal information is handled. Which of the following should the company consult?

​

A. GDPR
B. ISO
C. NIST
D. PCI DSS

​

Question 4

​

bottom of page