CompTIA Security+ Quiz 6 Flashcards
(35 cards)
A network protocol used for secure file transfer over SSH is known as:
A) TFTP
B) SFTP
C) SCP
D) FTPS
B) SFTP
Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?
A) VDE
B) VNC
C) VDI
D) RDP
C) VDI
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:
A) WPA
B) WPS
C) WEP
D) WAP
B) WPS
Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?
A) CLI
B) JS
C) Bash
D) cmd.exe
C) Bash
A networking hardware device connecting wireless devices to a wired network is referred to as:
A) WAF
B) AP
C) RAS
D) NIC
B) AP
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
A) BYOD
B) COPE
C) VDI
D) CYOD
B) COPE
Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?
A) MD5
B) CRC
C) SHA
D) RIPEMD
B) CRC
What is the name of a network layer protocol that specifies the format of packets and addressing
scheme in network communications?
A) UDP
B) IP
C) TCP
D) NetBIOS
B) IP
The term āP2Pā refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.
A) True
B) False
B) False
Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?
A) ITIL
B) RFC
C) PKCS
D) ISO/IEC
C) PKCS
Which of the following answers refers to a tunneling point-to-point protocol?
A) EAP
B) PPTP
C) MPLS
D) PPP
B) PPTP
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
A) AND
B) OR
C) NOT
D) XOR
D) XOR
Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?
A) DHE
B) RSA
C) AES
D) DSA
B) RSA
An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:
A) OAuth
B) TOTP
C) RADIUS
D) HOTP
B) TOTP
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
A) DLP
B) SIEM
C) FIM
D) SHA
C) FIM
Which of the following provides a countermeasure against SPOF?
A) HA
B) DLP
C) VM
D) AAA
A) HA
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
A) Auditing
B) Authentication
C) Authorization
D) Accounting
D) Accounting
Which of the answers listed below refers to a method that enables secure conversion of user passwords into cryptographic keys?
A) PBKDF2
B) PFS
C) RIPEMD
D) PKCS #7
A) PBKDF2
Which of the following solutions provides passive network security breach response on an individual computer system?
A) HIDS
B) NIPS
C) HIPS
D) NIDS
A) HIDS
Which of the answers listed below refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?
A) TAXII
B) CVE
C) STIX
D) CVSS
B) CVE
Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?
A) ECDSA
B) RSA
C) IDEA
D) DSA
C) IDEA
Which of the answers listed below refers to a standardized method employed by the U.S. federal government to authenticate the identities of employees and contractors via smart card-based credentials?
A) PIV
B) MFA
C) SAE
D) PKI
A) PIV
A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:
A) DSU
B) CSU
C) FPS
D) MTU
D) MTU
Which of the following answers refers to an organized approach to managing and mitigating security incidents?
A) XDR
B) IR
C) SOAR
D) IRP
B) IR