CompTIA Security+ Quiz 1 Flashcards
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:
A) MFA
B) CAPTCHA
C) ACL
D) NIPS
B) CAPTCHA
Which of the following is the recommended replacement for DES?
A) DSA
B) RSA
C) RC4
D) AES
D) AES
Which of the terms listed below refers to the process of creating and maintaining computer applications?
A) RAD
B) SDLC
C) OOP
D) SaaS
B) SDLC
A type of firmware interface designed as a replacement for BIOS is called:
A) UEFI
B) GPT
C) ACPI
D) PXE
A) UEFI
Which of the following answers refers to a network security solution providing a single point of protection against various types of threats?
A) IDP
B) AV
C) UTM
D) NGFW
C) UTM
A WAP is a specific type of AP that is used to create WLANs.
A) True
B) False
A) True
Which of the answers listed below refers to a language used for creating and organizing the content of web pages?
A) HTML
B) CSS
C) JS
D) HTTP
A) HTML
Which network protocol enables retrieving contents of an Internet page from a web server?
A) SNMP
B) HTTP
C) SMTP
D) IMAP
B) HTTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
A) SFTP
B) HTTPS
C) FTPS
D) SHTTP
B) HTTPS
The purpose of PCI DSS is to provide protection for:
A) Credit cardholder data
B) Licensed software
C) User passwords
D) Personal health information
A) Credit cardholder data
Which term describes the predicted loss of value to an asset based on a single security incident?
A) SLE
B) ARO
C) ALE
D) SLA
A) SLE
Which of the following acronyms refers to a software that provides the functionality of a physical computer?
A) SDN
B) SaaS
C) VM
D) SoC
C) VM
What is the common term for a group of protocols used to carry voice data over a packet-switched network?
A) ISDN
B) PBX
C) VoIP
D) PSTN
C) VoIP
Which of the terms listed below refers to a formal contract between business partners outlining the rights, responsibilities, and obligations of each partner regarding the management, operation, and decision-making processes within the business?
A) MSA
B) SLA
C) BPA
D) MOA
C) BPA
Which of the following file transfer protocols does not provide encryption?
A) SCP
B) FTPS
C) FTP
D) SFTP
C) FTP
The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for: (Select best answer)
A) PII
B) ESN
C) PHI
D) PIV
C) PHI
Which of the answers listed below refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?
A) PKI
B) RA
C) PKCS
D) CA
A) PKI
Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?
A) PHI
B) PIV
C) PII
D) PKI
C) PII
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is referred to as:
A) NAC
B) SSO
C) AAA
D) MFA
B) SSO
Which of the cryptographic algorithms listed below is the least vulnerable to attacks?
A) AES
B) DES
C) RC4
D) 3DES
A) AES
Which of the following answers illustrates the difference between passive and active network security breach response?
A) HIPS vs. NIPS
B) UTM vs. Firewall
C) NIPS vs. UTM
D) IDS vs. IPS
D) IDS vs. IPS
An SELinux kernel security feature for implementing stricter access controls and policies is known as:
A) DAC
B) RBAC
C) MAC
D) ABAC
C) MAC
Which wireless security protocol has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?
A) EAP
B) AES
C) WPA2
D) WEP
D) WEP
Which access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?
A) ABAC
B) MAC
C) RuBAC
D) DAC
E) RBAC
C) RuBAC