CompTIA Security+ Quiz 2 Flashcards
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?
A) IPS
B) DLP
C) IDS
D) DEP
B) DLP
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
A) ACL
B) CSR
C) MAC
D) AUP
A) ACL
Which type of firmware performs initial hardware checks after the computer is powered on?
A) BIOS
B) POST
C) CMOS
D) PROM
A) BIOS
Which of the answers listed below refers to a software technology designed to simplify network infrastructure management?
A) SDN
B) QoS
C) VDI
D) CDN
A) SDN
Which of the following is an MS Windows component that enables encryption of individual files?
A) EFS
B) NTFS
C) DFS
D) NFS
A) EFS
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
A) WWAN
B) VPN
C) PAN
D) VLAN
B) VPN
Which of the answers listed below refers to a security standard introduced to address the vulnerabilities found in WEP?
A) TKIP
B) AES
C) WPA
D) CCMP
C) WPA
The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
A) True
B) False
A) True
POP3 is used for:
A) Name resolution
B) Sending email messages
C) File exchange
D) Email retrieval
D) Email retrieval
Which cloud service model would provide the best solution for a web developer intending to create a web app?
A) XaaS
B) SaaS
C) PaaS
D) IaaS
C) PaaS
Which of the following answers refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
A) MD5
B) SHA
C) CRC
D) HMAC
B) SHA
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
A) TLS
B) SSH
C) IPsec
D) VPN
C) IPsec
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
A) DNS
B) SNMP
C) NAT
D) DHCP
D) DHCP
Which of the following regulations protects the privacy and personal data of the EU citizens?
A) PHI
B) HIPAA
C) PCI DSS
D) GDPR
D) GDPR
Which of the answers listed below refers to a mechanical data storage medium type that relies on magnetic plates and moving parts for data storage and retrieval?
A) RAM
B) HDD
C) NVMe
D) SSD
B) HDD
Which of the following terms refers to an environmental control system?
A) SCADA
B) HIPS
C) TEMPEST
D) HVAC
D) HVAC
A type of network connecting computers within a small geographical area such as a building or group of buildings is referred to as:
A) PAN
B) LAN
C) MAN
D) WAN
B) LAN
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
A) QoS
B) DHCP
C) NAT
D) DNS
C) NAT
Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?
A) PSK
B) 802.1X
C) SAE
D) TKIP
A) PSK
Copies of lost private encryption keys can be retrieved from a key escrow by RAs (i.e., individuals with access to key database and permission level allowing them to extract keys from escrow).
A) True
B) False
A) True
Which type of unsolicited messaging relies on text-based communication?
A) VAM
B) SPIM
C) JMS
D) SPIT
B) SPIM
Which of the answers listed below refers to a secure replacement for Telnet?
A) CHAP
B) FTP
C) SNMP
D) SSH
D) SSH
Which of the following answers refers to a family of cryptographic hash functions used in a variety of security applications, including digital signatures, password storage, secure communications, and data integrity verification?
A) RSA
B) IDEA
C) AES
D) SHA
D) SHA
In the AAA security architecture, the process of granting or denying access to resources is known as:
A) Auditing
B) Authentication
C) Authorization
D) Accounting
Authorization