CompTIA Security+ SY0-701 Free Quiz
Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
Which of the following is an example of a passive attack?
CorrectIncorrect -
Question 2 of 10
2. Question
A security analyst discovers that sensitive data is being leaked to an external server through an encrypted tunnel. Which attack is
CorrectIncorrect -
Question 3 of 10
3. Question
What is the primary purpose of a honeypot?
CorrectIncorrect -
Question 4 of 10
4. Question
A company needs to secure their wireless network. Which of the following is the most secure method?
CorrectIncorrect -
Question 5 of 10
5. Question
Which protocol is used for encrypted file transfers?
CorrectIncorrect -
Question 6 of 10
6. Question
Which of the following is an example of physical security control?
CorrectIncorrect -
Question 7 of 10
7. Question
What is the primary benefit of implementing network segmentation?
CorrectIncorrect -
Question 8 of 10
8. Question
Which security principle ensures that users can only access the data and resources necessary for their job roles?
CorrectIncorrect -
Question 9 of 10
9. Question
An attacker’s exploit is able to recall information from a database by inputting commands into a web interface. What type of attack is this?
CorrectIncorrect -
Question 10 of 10
10. Question
After detecting unusual traffic patterns, a security team isolates the infected system. Which step of the incident response process should come next?
CorrectIncorrect