CompTIA Security + Mock Flashcards
Things To Study | Test 13-18
Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?
SSL, IKE, ESP or DHE ?
IKE (Internet Key Exchange)
A protocol used to set up a secure VPN connection by negotiating and managing encryption keys.
Think of it as a digital handshake that agrees on how to lock and unlock data between two devices.
Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?
CRC, AH, IKE or AES ?
AH (Authentication Header)
A protocol used in IPsec to provide data integrity, authentication, and anti-replay protection for network packets.
It ensures the data wasn’t tampered with in transit—like a tamper-proof seal on a package.
Which of the IPsec modes provides entire packet encryption?
A. Tunnel
B. Payload
C. Transport
D. Default
Tunnel (IPsec)
A secure, encrypted connection between two endpoints that protects data in transit by encapsulating it within IPsec protocols (AH/ESP).
Functions like a private underground passage for network traffic.
Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
PHI, Biometrics, ID or PII ?
PII (Personally Identifiable Information)
Any data that can identify an individual, either alone or combined with other information (e.g., name, SSN, biometrics, or even device IDs when linked to a person).
Encryption methods used to protect data at rest:
FDE SED and EFS
FDE (Full Disk Encryption)
Encrypts all data on a storage device (including OS/files). Protects against physical theft. Requires pre-boot authentication (e.g., BitLocker).
SED (Self-Encrypting Drive)
A hardware-based FDE solution where the drive itself handles encryption/decryption automatically. No performance overhead (e.g., TCG Opal drives).
EFS (Encrypting File System)
File/folder-level encryption built into NTFS (Windows). Uses user certificates for access control. Doesn’t encrypt system files.
Encryption methods used to protect data in transit:
VPN, TLS and IPsec
VPN (Virtual Private Network)
Creates a secure, encrypted tunnel between your device and a private network over the internet, hiding your data and location from outsiders.
TLS (Transport Layer Security)
A cryptographic protocol that ensures secure communication over a network by encrypting data between web browsers and servers (used in HTTPS).
IPsec (Internet Protocol Security)
A suite of protocols that secures internet communication by authenticating and encrypting each IP packet in a network connection (often used in VPNs).
Which of the following answers refer to data masking? (Select 2 answers)
Replaces sensitive data with fictitious or modified data while retaining its original format.
Allows for data manipulation in environments where the actual values are not needed.
Data Masking
A technique that obscures sensitive data (e.g., PII, financial info) in non-production environments to protect privacy while maintaining usability.
Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?
A. Tokenisation
B. Encryption
C. Obfuscation
D. Hashing
Obfuscation
The deliberate act of making code, data, or communications difficult to understand or analyse, often used to hide malicious activity or protect intellectual property.
Hardware RAID Level 5 features:
A. Requires at least 2 drives to implement.
B. Continues to operate in case of failure of more than 1 drive.
C. Is also known as disk striping with double parity.
D. Requires at least 3 drives to implement.
E. Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created by the remaining drives).
F. Requires at least 4 drives to implement
G. Is also known as disk striping with parity.
D. Requires at least 3 drives to implement.
E. Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created by the remaining drives).
G. Is also known as disk striping with parity.
RAID (Redundant Array of Independent Disks)
A storage technology that combines multiple physical disks into a single logical unit for improved performance, redundancy, or both.
Hardware RAID Level 6 features:
A. Is also known as disk striping with parity.
B. Requires at least 4 drives to implement.
C. Offers increased performance and fault tolerance (failure of up to 2 drives does not destroy the array and lost data can be re-created by the remaining drives).
D. Requires at least 3 drives to implement.
E. Is also known as disk striping with double parity .
F. Continues to operate in case of failure of more than 2 drives.
G. Requires at least 5 drives to implement.
B. Requires at least 4 drives to implement.
C. Offers increased performance and fault tolerance (failure of up to 2 drives does not destroy the array and lost data can be re-created by the remaining drives).
E. Is also known as disk striping with double parity.
RAID (Redundant Array of Independent Disks)
A storage technology that combines multiple physical disks into a single logical unit for improved performance, redundancy, or both.
Which of the answers listed below refers to the primary function of load balancing?
A. Maintains identical copies of data across multiple servers to enhance data availability and reliability.
B. Distributes workload across multiple servers for improved performance.
C. Groups servers together to provide high availability and fault tolerance.
D. Distributes content geographically across multiple servers to improve performance, reduce latency, and handle high volumes of traffic.
B. Distributes workload across multiple servers for improved performance.
Load Balancing
The distribution of network traffic across multiple servers or resources to optimise efficiency, reliability, and performance.
Which alternate site allows for the fastest disaster recovery?
A. Cold site
B. Hot site
C. Mobile site
D. Warm site
Hot Site
A fully operational, ready-to-use disaster recovery facility with all necessary hardware, software, and data to immediately resume business operations after a failure.
Which of the solutions listed below provides redundancy and fault tolerance by dividing tasks into smaller subtasks and distributing them across multiple systems to be executed simultaneously?
A. Load balancing
B. Multitasking
C. Clustering
D. Parallel processing
Parallel Processing
A computing method where multiple tasks are executed simultaneously across multiple processors or cores to speed up performance.
A file-based representation of the state of a virtual machine at a given point in time is referred to as:
A. Restore point
B. Shadow copy
C. Snapshot
D. System image
Snapshot
A point-in-time copy of a system, file, or dataset, preserving its state for backup, recovery, or analysis.
Key Traits:
- Static Backup: Captures exact state at a specific moment.
- Quick Restoration: Enables rollback to the snapshot’s state.
- Use Cases: VM backups, database versioning, forensic analysis.
What type of backups are commonly used with virtual machines?
A. Incremental backups
B. Snapshot backups
C. Tape backups
D. Differential backups
Snapshot Backups
A backup method that captures the exact state of a system, file, or dataset at a specific point in time, allowing for quick restoration if needed.
Which of the terms listed below is used to describe a foundational level of security configurations and settings required to safeguard a system?
A. Logical segmentation
B. Secure baseline
C. Access control levels
D. Principle of least privilege
Secure Baseline
A predefined set of security configurations applied to systems or software to ensure they meet minimum protection standards.
Key Traits:
- Standardisation: Uniform settings across all devices (e.g., firewalls, password policies).
- Hardening: Disables risky defaults (guest accounts, unused ports).
- Compliance: Aligns with frameworks like CIS Benchmarks or NIST guidelines.
Which of the following answers refers to a mobile security solution that enables separate controls over the user and enterprise data?
A. Resource provisioning
B. Content management
C. Storage segmentation
D. Just-in-time permissions
Storage Segmentation
The practice of dividing storage systems into isolated sections to limit access and reduce risk of unauthorised data exposure.
Key Traits:
- Isolation: Separates data by type, sensitivity, or user (e.g., HR vs. public files).
- Access Control: Enforces strict permissions per segment (role-based rules).
- Use Cases: PCI DSS (payment data), HIPAA (medical records), multi-tenant clouds.
In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:
A. Containerisation
B. Storage segmentation
C. Virtualisation
D. Content management
Containerisation
A lightweight virtualisation method that packages applications and their dependencies into isolated, portable units (containers) running on a shared OS kernel.
Key Traits:
- Efficiency: Uses fewer resources than VMs (no full OS per instance).
- Portability: Runs consistently across environments (dev, test, prod).
Isolation: Processes are segregated, though less secure than VMs.
Which of the answers listed below refer to workstation hardening techniques? (Select 3 answers)
- Hiding administrator accounts.
- Regularly applying security patches and updates to the OS and installed software.
- Disabling all internet access.
- Removing or disabling unnecessary drivers, services, software, and network protocols.
- Limiting unauthorised or unauthenticated user access.
Regularly applying security patches and updates to the OS and installed software.
Removing or disabling unnecessary drivers, services, software, and network protocols.
Limiting unauthorised or unauthenticated user access.
Workstation Hardening
The process of securing a computer (desktop/laptop) by reducing vulnerabilities through configuration changes, patches, and access controls.
Which type of software enables centralised administration of mobile devices?
MFA, MMC, MDM or MFD ?
MDM (Mobile Device Management)
A centralised system for managing and securing mobile devices (smartphones, tablets) used within an organisation.
Key Traits:
Remote Control: Enforces policies (passcodes, encryption), wipes lost devices.
App Management: Approves/blocks apps, pushes updates.
BYOD Support: Separates work/personal data on employee-owned devices.
Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?
SAE, IKE, PSK, or AES ?
SAE (Simultaneous Authentication of Equals)
A secure key exchange protocol used in WPA3 to replace the older PSK (Pre-Shared Key) method, providing stronger protection against brute-force attacks.
Key Traits:
- Forward Secrecy: Generates unique session keys per connection.
- Resilience: Resists offline dictionary attacks.
- Usage: Mandatory in WPA3 for Wi-Fi security.
What are the characteristics of TACACS+? (Select 3 answers)
A. Encrypts only the password in the access-request packet.
B. Combines authentication and authorisation.
C. Encrypts the entire payload of the access-request packet.
D. Primarily used for device administration.
E. Separates authentication and authorisation.
F. Primarily used for network access.
C. Encrypts the entire payload of the access-request packet.
D. Primarily used for device administration.
E. Separates authentication and authorisation.
TACACS+ (Terminal Access Controller Access Control System Plus)
A Cisco-developed AAA protocol for granular device administration (e.g., routers, switches).
What are the characteristic features of RADIUS? (Select 3 answers)
A. Primarily used for network access.
B. Encrypts the entire payload of the access-request packet.
C. Combines authentication and authorisation.
D. Encrypts only the password in the access-request packet.
E. Primarily used for device administration.
F. Separates authentication and authorisation.
A. Primarily used for network access.
C. Combines authentication and authorisation.
D. Encrypts only the password in the access-request packet.
RADIUS (Remote Authentication Dial-In User Service)
A centralised AAA (Authentication, Authorisation, Accounting) protocol for managing network access, often used for VPNs, Wi-Fi, and ISP logins.
Dynamic code analysis:
- Typically used later in the software development lifecycle.
- Analyses runtime properties like memory usage, performance, and error handling to identify issues such as memory leaks, performance bottlenecks, and runtime errors.
- Involves executing the code and analysing its behaviour at runtime.
Dynamic Code Analysis
The process of testing software by executing it in real-time to identify vulnerabilities, runtime errors, or malicious behaviour.
Key Traits:
1. Runtime Testing: Analyses code while it runs (vs. static analysis).
- Finds Live Issues: Detects memory leaks, zero-day exploits, or insecure dependencies.
- Tools: Fuzzers, debuggers, or sandboxed environments.