Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 86

Mary Smith

Sun, 19 Apr 2026

ComptiA Security+ Certification Exam Questions and answer - Part 86

1. The chief security officer (CS0) has issued a new policy that requires that all internal websites be configured for HTTPS traffic only. The network administrator has been tasked to update all internal sites without incurring additional costs. Which of the following is the best solution for the network administrator to secure each internal website?

A) Use a signing certificate as a wild card certificate
B) Use a self-signed certificate on each internal server
C) Use certificates signed by a public ca
D) Use certificates signed by the company CA



2. Which of the following are considered among the BEST indicators that a received message is a hoax? (Choose two.)(Select 2answers)

A) Claims of possible damage to computer hardware
B) Warnings of monetary loss to the receiver
C) No valid digital signature from a known security organization
D) Minimal use of uppercase letters in the message
E) Embedded URLs


3. Which of the following is a major difference between XSS attacks and remote code exploits?

A) XSS attacks use machine language,while remote exploits use interpreted language
B) Remote code exploits allow writing code at the client side and executing it,while XSS attacks require no code to work
C) Remote code exploits aim to escalate attackers - privileges,while XSS attacks aim to gain access only
D) XSS attacks target servers,while remote code exploits target clients



4. Which of the following components of printers and MFDs are MOST likely to be used as vectors of compromise if they are improperly configured?

A) Embedded web server
B) Spooler
C) LCD control panel
D) Network interface



5. The data backup window has expanded into the morning hours and has begun to affect production users. The main bottleneck in the process is the time it takes to replicate the backups to separate severs at the offsite data center. Which of the following uses of deduplication could be implemented to reduce the backup window?

A) Implement deduplication at the network level between the two locations
B) Implement deduplication on the storage array to reduce the amount of drive space needed
C) Implement deduplication on the server storage to reduce the data backed up
D) Implement deduplication on both the local and remote servers



1. Right Answer: D
Explanation: This is a way to update all internal sites without incurring additional costs? To be a CA (Certificate Authority),you need an infrastructure that consists of considerable operational elements,hardware,software,policy frameworks and practice statements,auditing,security infrastructure and personnel.

2. Right Answer: C,E
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: A
Explanation:

5. Right Answer: B
Explanation:

0 Comments

Leave a comment