Learning
Learning
Loading practice session...
CompTIA Network+ · Exam domain
58 practice questions in this domain. AI-tutored explanations for every answer.
Sign in to practice all 58 questions with progress tracking and AI explanations.
1. Which principle of the CIA triad is primarily concerned with ensuring that data is not altered or destroyed in an unauthorized manner?
Explanation
Integrity ensures that data remains accurate and complete, preventing unauthorized modifications or destruction. A is incorrect because Confidentiality focuses on preventing unauthorized disclosure. C is incorrect because Availability ensures timely and reliable access to data. D is incorrect because Non-repudiation prevents denial of actions.
2. Which access control model assigns permissions based on a user's organizational role?
Explanation
Role-Based Access Control (RBAC) assigns permissions based on the roles a user holds within an organization, simplifying access management. A is incorrect because DAC gives data owners control over who can access their data. B is incorrect because MAC uses security labels to restrict access. D is incorrect because Rule-Based Access Control uses predefined rules to grant or deny access.
3. Which of the following BEST exemplifies the principle of 'Defense in Depth'?
Explanation
Defense in Depth involves implementing multiple security layers to provide redundancy and increase overall security posture. A is incorrect because it represents a single point of failure. C is incorrect because it increases the attack surface. D is incorrect because it removes all security controls.
4. Which type of attack involves an attacker impersonating a legitimate device to intercept communications between two other devices?
Explanation
A Man-in-the-Middle (MitM) attack involves an attacker intercepting communications between two parties by impersonating a legitimate device. A is incorrect because a DoS attack aims to disrupt service availability. C is incorrect because SQL injection targets databases. D is incorrect because XSS targets vulnerabilities in web applications.
5. An attacker creates a fake Wi-Fi hotspot that mimics a legitimate network. Unsuspecting users connect to the fake hotspot, allowing the attacker to capture their traffic. What type of attack is this?
Explanation
This is an Evil Twin attack, where a rogue access point is set up to mimic a legitimate one to steal credentials. A is incorrect because a deauthentication attack forces clients to disconnect from a legitimate network. C is incorrect because Bluejacking is sending unsolicited messages over Bluetooth. D is incorrect because wireless jamming disrupts wireless signals.
Practice all 58+ questions in this domain
Start free practice →