Security

Master security concepts, device security, password practices, and encryption fundamentals (19% of exam).

5 minutes 5 Questions

Security in the context of CompTIA Tech+ encompasses the fundamental principles and practices essential for protecting computer systems, networks, and data from unauthorized access, threats, and vulnerabilities. This domain covers several critical areas that IT professionals must understand to main…

Test mode:
Tech+ - Security Example Questions

Test your knowledge of Security

Question 1

Gregory, a database administrator at a financial services company, is troubleshooting connectivity issues and decides to test accessing an internal admin portal from his personal smartphone using the office guest WiFi network. The guest network requires accepting terms of service but has no authentication. Gregory's smartphone browser shows the admin portal URL correctly with HTTPS and a valid certificate, and he can see the login page loading normally. The portal contains sensitive customer financial records and system configuration options. Gregory knows his credentials work and could quickly verify if the portal is accessible, which would help isolate whether the connectivity problem is network-related or workstation-specific. Other IT staff have already left for the day and the issue is affecting overnight batch processing. How should Gregory approach this troubleshooting scenario while adhering to safe browsing protocols?

Question 2

During a security audit at a software development company, the auditor discovers that the organization's password manager implements biometric authentication as a secondary unlock method alongside the master password. A senior developer questions whether this biometric data could be extracted from the password manager's database if compromised. The auditor needs to clarify how modern password managers typically handle biometric authentication data storage. What should the auditor explain about where biometric templates are typically stored in well-designed implementations?

Question 3

Marcus, a junior network administrator, notices that a developer's workstation is generating unusual outbound traffic patterns during off-hours. Upon investigation, he discovers that a recently installed third-party development tool is attempting to communicate with multiple external IP addresses. The developer insists the tool is legitimate and necessary for their work. The organization's security policy requires all applications to be validated before network access is granted. What is the most appropriate configuration approach Marcus should implement using the personal firewall on the developer's workstation?

More Security questions
540 questions (total)