Inspirational journeys

Follow the stories of academics and their research expeditions

ComptiA Security+ Certification Exam Questions and answer - Part 87

Mary Smith

Thu, 16 Apr 2026

ComptiA Security+ Certification Exam Questions and answer - Part 87

1. Which of the following attack types is being carried out where a target is being sent unsolicited messages via Bluetooth?

A) Bluejacking
B) Rogue tethering
C) War chalking
D) Bluesnarfing



2. Systems administrator and key support staff come together to simulate a hypothetical interruption of service. The team updates the disaster recovery processes and documentation after meeting. Which of the following describes the team's efforts?

A) Tabletop exercise
B) Order of restoration
C) Business impact analysis
D) Continuity of operation



3. Several workstations on a network are found to be on OS versions that are vulnerable to a specific attack. Which of the following is considered to be a corrective action to combat this vulnerability?

A) Leverage server isolation
B) Install an antivirus definition patch
C) Install a vendor-supplied patch
D) Install an intrusion detection system
E) Educate the workstation users


4. Which of the following delineates why it is important to perform egress filtering and monitoring on Internet connected security zones of interfaces on a firewall?

A) To prevent DDoS attacks originating from external network
B) To rebalance the amount of outbound traffic and inbound traffic
C) Outbound traffic could be communicating to known botnet sources
D) Egress traffic is more important than ingress traffic for malware prevention



5. Which of the following control types would a backup of server data provide in case of a system issue?

A) Preventive
B) Deterrent
C) Corrective
D) Detective



1. Right Answer: A
Explanation: Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones,PDAs or laptop computers,sending a vCard which typically contains a message in the name field (i.e.,for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: C
Explanation:

5. Right Answer: C
Explanation:

0 Comments

Leave a comment