Security
Master security concepts, device security, password practices, and encryption fundamentals (19% of exam).
Security in the context of CompTIA Tech+ encompasses the fundamental principles and practices essential for protecting computer systems, networks, and data from unauthorized access, threats, and vulnerabilities. This domain covers several critical areas that IT professionals must understand to main…
Concepts covered: Confidentiality principle, Integrity principle, Availability principle, CIA triad overview, Authentication methods, Authorization and access control, Multi-factor authentication (MFA), Single sign-on (SSO), Anti-malware software, Antivirus protection, Personal firewalls, Operating system patching, Software updates and patches, Physical security measures, Safe browsing practices, Mobile device security, Malware types and prevention, Password length requirements, Password complexity rules, Password privacy and protection, Avoiding password reuse, Password managers, Passphrase strategies, Account lockout policies, Encryption fundamentals, Data at rest encryption, Data in transit encryption, HTTPS protocol, VPN (Virtual Private Network), Mobile device encryption, Full disk encryption, SSL/TLS certificates, Phishing attacks, Social engineering, Ransomware threats, Insider threats, Zero-day vulnerabilities
Tech+ - Security Example Questions
Test your knowledge of Security
Question 1
Gregory, a database administrator at a financial services company, is troubleshooting connectivity issues and decides to test accessing an internal admin portal from his personal smartphone using the office guest WiFi network. The guest network requires accepting terms of service but has no authentication. Gregory's smartphone browser shows the admin portal URL correctly with HTTPS and a valid certificate, and he can see the login page loading normally. The portal contains sensitive customer financial records and system configuration options. Gregory knows his credentials work and could quickly verify if the portal is accessible, which would help isolate whether the connectivity problem is network-related or workstation-specific. Other IT staff have already left for the day and the issue is affecting overnight batch processing. How should Gregory approach this troubleshooting scenario while adhering to safe browsing protocols?
Question 2
During a security audit at a software development company, the auditor discovers that the organization's password manager implements biometric authentication as a secondary unlock method alongside the master password. A senior developer questions whether this biometric data could be extracted from the password manager's database if compromised. The auditor needs to clarify how modern password managers typically handle biometric authentication data storage. What should the auditor explain about where biometric templates are typically stored in well-designed implementations?
Question 3
Marcus, a junior network administrator, notices that a developer's workstation is generating unusual outbound traffic patterns during off-hours. Upon investigation, he discovers that a recently installed third-party development tool is attempting to communicate with multiple external IP addresses. The developer insists the tool is legitimate and necessary for their work. The organization's security policy requires all applications to be validated before network access is granted. What is the most appropriate configuration approach Marcus should implement using the personal firewall on the developer's workstation?