CompTIA Security+ Quiz 5 Flashcards
Which of the following answers refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?
A) SSL
B) IKE
C) ESP
D) DHE
B) IKE
An access control model that enforces the strictest set of access rules is known as:
A) MAC
B) RBAC
C) DAC
D) ABAC
A) MAC
Which of the acronyms listed below refers to a cryptographic software tool for secure email communication and data protection?
A) DES
B) PEM
C) EFS
D) PGP
D) PGP
What type of action allows an attacker to exploit the XSS vulnerability?
A) Code injection
B) Banner grabbing
C) PIN recovery
D) Input validation
A) Code injection
A type of vulnerability where the state of a resource is verified at one point in time but may change before the resource is actually used is called:
A) TOC
B) TOC/TOU
C) TOU
D) TSIG
B) TOC/TOU
The term “SMS” is used in reference to:
A) Text messaging services
B) Enhanced messaging services
C) Multimedia messaging services
D) Rich communication services
A) Text messaging services
Which of the following terms refers to a framework and knowledge base that provides understanding of TTPs used during cyberattacks?
A) CVSS
B) ATT&CK
C) TAXII
D) STIX
B) ATT&CK
Which of the answers listed below refers to a security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level?
A) SWG
B) CASB
C) EDR
D) NGFW
C) EDR
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
A) TCP/IP
B) DNS
C) SQL
D) DHCP
B) DNS
The term “OTA” refers to the process of wirelessly transmitting data, updates, or information to electronic devices, such as smartphones, tablets, or IoT devices, typically using cellular networks, Wi-Fi, or other wireless communication methods
A) True
B) False
A) True
Which of the acronyms listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic and key management functions?
A) EFS
B) HSM
C) SFC
D) TPM
B) HSM
What is a PUP? (Select 3 answers)
A) A type of computer program not explicitly classified as malware by AV software
B) An application downloaded and installed without the user’s consent
C) A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
D) An application downloaded and installed with the user’s consent
E) A type of computer program explicitly classified as malware by AV applications
F)A type of free, utility software often bundled with a paid app
A) A type of computer program not explicitly classified as malware by AV software
C) A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads
A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is referred to as:
A) FAR
B) CER
C) CRC
D) FRR
D) FRR
Which of the following enables the automation of vulnerability scanning and compliance checking?
A) SAML
B) OVAL
C) SCAP
D) SASE
C) SCAP
Which of the acronyms listed below refers to a comprehensive strategy and set of procedures designed to ensure that an organization can continue its critical operations and functions during and after a disruptive event?
A) BIA
B) SLE
C) BCP
D) BPA
C) BCP
Given the computational limitations of IoT devices, smartcards, and mobile devices, which of the following digital signature algorithms would be the most efficient choice due to its smaller key size and lower computational requirements?
A) RSA
B) ECDHE
C) DSA
D) ECDSA
E) ECC
D) ECDSA
Which type of software is used to prevent, detect, and remove malware from computer systems and networks?
A) IDS
B) SaaS
C) AV
D) WAF
C) AV
An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:
A) ALE
B) SLA
C) ARO
D) SLE
C) ARO
Which of the answers listed below refers to a rule-based access control mechanism associated with files and/or directories?
A) EFS
B) FACL
C) FIM
D) NTFS
B) FACL
Which of the following answers refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
A) DKIM
B) SRV
C) CNAME
D) SPF
D) SPF
Which of the answers listed below refers to a cryptographic method used to verify that a message or data has remained unaltered during transmission and originates from an authorized source?
A) MAC
B) CBC
C) PEM
D) GCM
A) MAC
Which of the following answers refers to a network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
A) UTM
B) WIDS
C) NGFW
D) WAF
B) WIDS
Which of the acronyms listed below refers to a client-server protocol that provides centralized AAA services for remote-access users?
A) OAuth
B) RADIUS
C) LDAP
D) OpenID
B) RADIUS
Which type of software enables centralized administration of mobile devices?
A) MFA
B) MMC
C) MDM
D) MFD
C) MDM