
Comptia Security+
Quiz by Gaurav Sharma
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
100 questions
Show answers
- Q1Which of the following is a common type of social engineering attack?TrojanWormPhishingDDoS30s
- Q2What is the primary purpose of a firewall in network security?To encrypt dataTo provide backupTo control incoming and outgoing network trafficTo remove malware30s
- Q3What does the acronym DDoS stand for in the context of cybersecurity?Dynamic Delivery of ServicesDirect Denial of SecurityDistributed Denial of ServiceDistributed Data Operations System30s
- Q4Which of the following is a method for securing wireless networks?Open authenticationWEP encryptionWPA3 encryptionMAC filtering30s
- Q5What does multi-factor authentication (MFA) aim to enhance?User interface designNetwork speedSecurity during user authenticationData storage30s
- Q6Which of the following is an example of a biometric authentication method?PasswordFingerprint scanSecurity questionPIN30s
- Q7What is the main function of an intrusion detection system (IDS)?To monitor network traffic for suspicious activityTo create backup copies of dataTo eliminate virusesTo manage network bandwidth30s
- Q8Which protocol is used for secure data transmission over the Internet?FTPHTTPSHTTPSMTP30s
- Q9Which of the following is a key benefit of using a Virtual Private Network (VPN)?Increased internet speedAccessing geo-restricted content without any security concernsProtection of data from eavesdroppersLowering your internet bill30s
- Q10What is the purpose of a security policy in an organization?To monitor employee attendanceTo limit internet usageTo define security requirements and guidelinesTo manage financial transactions30s
- Q11Which of the following best describes the purpose of the CIA Triad in information security?To ensure the principles of Confidentiality, Integrity, and Availability are maintainedTo maximize system performanceTo only protect data from unauthorized accessTo enforce laws regarding data privacy30s
- Q12What type of security control is designed to detect and respond to security incidents?Preventive controlDeterrent controlDetective controlCorrective control30s
- Q13Which of the following best describes the function of hashing in cryptography?To allow for data retrieval with a keyTo encrypt data for secure transmissionTo produce a fixed-size output that represents data integrityTo obfuscate plain text without a key30s
- Q14What feature does Multi-Factor Authentication (MFA) provide?It allows access from any device without verificationIt is a type of encryption used for data protectionIt relies only on passwords for securityIt requires multiple forms of verification before granting access30s
- Q15What does the term 'vulnerability' refer to in the context of information security?A weakness in a system that can be exploited by threatsThe likelihood of a threat exploiting a weaknessAn active threat targeting a systemA protective measure against cyber attacks30s