CompTIA Security+ Quiz 6 Flashcards

(35 cards)

1
Q

A network protocol used for secure file transfer over SSH is known as:

A) TFTP
B) SFTP
C) SCP
D) FTPS

A

B) SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?

A) VDE
B) VNC
C) VDI
D) RDP

A

C) VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:

A) WPA
B) WPS
C) WEP
D) WAP

A

B) WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?

A) CLI
B) JS
C) Bash
D) cmd.exe

A

C) Bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A networking hardware device connecting wireless devices to a wired network is referred to as:

A) WAF
B) AP
C) RAS
D) NIC

A

B) AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?

A) BYOD
B) COPE
C) VDI
D) CYOD

A

B) COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?

A) MD5
B) CRC
C) SHA
D) RIPEMD

A

B) CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of a network layer protocol that specifies the format of packets and addressing
scheme in network communications?

A) UDP
B) IP
C) TCP
D) NetBIOS

A

B) IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term ā€œP2Pā€ refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.

A) True
B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?

A) ITIL
B) RFC
C) PKCS
D) ISO/IEC

A

C) PKCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a tunneling point-to-point protocol?

A) EAP
B) PPTP
C) MPLS
D) PPP

A

B) PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?

A) AND
B) OR
C) NOT
D) XOR

A

D) XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?

A) DHE
B) RSA
C) AES
D) DSA

A

B) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:

A) OAuth
B) TOTP
C) RADIUS
D) HOTP

A

B) TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to the process of maintaining the integrity of files and data?

A) DLP
B) SIEM
C) FIM
D) SHA

A

C) FIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following provides a countermeasure against SPOF?

A) HA
B) DLP
C) VM
D) AAA

16
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A) Auditing
B) Authentication
C) Authorization
D) Accounting

A

D) Accounting

17
Q

Which of the answers listed below refers to a method that enables secure conversion of user passwords into cryptographic keys?

A) PBKDF2
B) PFS
C) RIPEMD
D) PKCS #7

18
Q

Which of the following solutions provides passive network security breach response on an individual computer system?

A) HIDS
B) NIPS
C) HIPS
D) NIDS

19
Q

Which of the answers listed below refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?

A) TAXII
B) CVE
C) STIX
D) CVSS

20
Q

Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?

A) ECDSA
B) RSA
C) IDEA
D) DSA

21
Q

Which of the answers listed below refers to a standardized method employed by the U.S. federal government to authenticate the identities of employees and contractors via smart card-based credentials?

A) PIV
B) MFA
C) SAE
D) PKI

21
Q

A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:

A) DSU
B) CSU
C) FPS
D) MTU

22
Q

Which of the following answers refers to an organized approach to managing and mitigating security incidents?

A) XDR
B) IR
C) SOAR
D) IRP

23
Which type of technology enables contactless payment transactions? A) NFC B) IR C) PED D) WAP
A) NFC
24
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as: A) SOW B) MSA C) SLA D) MOU
C) SLA
24
Which of the answers listed below refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources? A) XDR B) WAF C) EDR D) SWG
A) XDR
25
Which of the following acronyms refers to a client authentication method used in WPA3? A) SAE B) IKE C) PSK D) AES
A) SAE
26
Which of the following answers refers to a security solution that provides control over elevated (i.e., administrative type) accounts? A) MFA B) IAM C) SSO D) PAM
D) PAM
26
Which of the answers listed below refers to a solution used for authentication, authorization, and user identity management? A) ICS B) AAA C) CIA D) IAM
D) IAM
27
A device designed to provide emergency power during an unexpected main power source outage is called: A) UPS B) PoE C) SVC D) PSU
A) UPS
28
Which of the answers listed below refers to an authentication method that enables the signing of an outbound email message with a digital signature? A) SPF B) DKIM C) SRV D) DMARC
B) DKIM
29
The term "VLAN" refers to a logical grouping of computers that allow computer hosts to function as if they were attached to the same broadcast domain regardless of their physical location. A) True B) False
A) True
30
Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information? A) PAT B) NAC C) DNS D) ARP
A) PAT
31
A file system format used in Windows OSs that offers improved performance, security, and file management is referred to as: A) ext4 B) EFS C) NTFS D) HFS+
C) NTFS