CompTIA Security+ Quiz 8 Flashcards
(35 cards)
Which of the answers listed below refers to a mobile device’s built-in functionality enabling the usage of locator applications?
A) WPS
B) GSM
C) SIM
D) GPS
D) GPS
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
A) PIN
B) SSID
C) IP
D) MAC
D) MAC
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is called:
A) MBR
B) GPT
C) PXE
D) GUID
A) MBR
In cloud computing, users on an on-premises network take advantage of a transit gateway to connect to:
A) WAN
B) VPC
C) SAN
D) VLAN
B) VPC
Which of the answers listed below refer to DSA? (Select 3 answers)
A) Asymmetric algorithm
B) Used for the key exchange process
C) Symmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
F) Used for encryption
A) Asymmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
Which of the following acronyms refer to office equipment that combines the functionality of multiple devices? (Select 2 answers)
A) MFD
B) IoT
C) MFP
D) PED
E) MFA
A) MFD
C) MFP
Which of the answers listed below describe(s) the characteristics of ECDSA? (Select all that apply)
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
C) Designed for data encryption
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
F) Enables the key exchange process
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
Which of the following answers refers to a deprecated stream cipher used in some legacy applications, such as WEP?
A) RSA
B) DES
C) SSL
D) RC4
D) RC4
Which of the answers listed below refers to a wireless network authentication protocol that enhances security by encapsulating the authentication process within an encrypted TLS tunnel?
A) PEAP
B) EAP
C) LEAP
D) RADIUS
A) PEAP
A type of metric used to evaluate the profitability of an investment by comparing the return generated from the investment relative to its cost is referred to as:
A) ROA
B) ROI
C) ROS
D) ROC
B) ROI
Which of the following facilitates the enforcement of mobile device policies and procedures?
A) MFA
B) MMC
C) MDM
D) MFD
C) MDM
Which of the answers listed below refers to an identifier used for objects in a PKI, such as CAs, digital certificates, and public key algorithms?
A) OID
B) DN
C) SAN
D) GUID
A) OID
Which of the following answers refers to a solution designed to strengthen the security of session keys?
A) ECB
B) PFS
C) EFS
D) PFX
B) PFS
Which of the answers listed below refers to a twisted-pair copper cabling type not surrounded by any shielding that would provide protection against interference from outside sources?
A) STP
B) Coax
C) UTP
D) Twinax
C) UTP
Which of the following terms refers to a technology that enables real-time audio and video communication between individuals or groups?
A) VPC
B) VTC
C) VoIP
D) VDI
B) VTC
A dedicated data storage solution that combines multiple disk drive components into a single logical unit to increase volume size, performance, or reliability is known as:
A) SAN
B) RAID
C) NAS
D) JBOD
B) RAID
Which of the answers listed below can be used to describe XSRF? (Select 3 answers)
A) Exploits the trust a website has in the user’s web browser
B) A user is tricked by an attacker into submitting unauthorized web requests
C) Website executes attacker’s requests
D) Exploits the trust a user’s web browser has in a website
E) A malicious script is injected into a trusted website
F) User’s browser executes attacker’s script
A) Exploits the trust a website has in the user’s web browser
B) A user is tricked by an attacker into submitting unauthorized web requests
C) Website executes attacker’s requests
Which of the following answers can be used to describe the characteristics of an XSS attack? (Select 3 answers)
A) Exploits the trust a user’s web browser has in a website
B) A malicious script is injected into a trusted website
C) User’s browser executes attacker’s script
D) Exploits the trust a website has in the user’s web browser
E) A user is tricked by an attacker into submitting unauthorized web requests
F) Website executes attacker’s requests
A) Exploits the trust a user’s web browser has in a website
B) A malicious script is injected into a trusted website
C) User’s browser executes attacker’s script
Which of the answers listed below refers to an encoding method (and a file format) for storing cryptographic objects such as X.509 certificates, CRLs, and private keys?
A) ECB
B) PEM
C) FIM
D) PFS
B) PEM
Which of the following answers refers to a centralized server that is used to distribute cryptographic keys and authenticate users and services within a computer network?
A) PKI
B) RAS
C) KDC
D) NAS
C) KDC
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions is called:
A) AGI
B) ML
C) NN
D) LLM
B) ML
Which data packet type is specifically used to detect and prevent network loops in Ethernet networks?
A) MTU
B) Jumbo frame
C) BPDU
D) Magic packet
C) BPDU
Which of the answers listed below refers to a key exchange protocol that generates temporary keys for each session, providing forward secrecy to protect past and future communications?
A) PFS
B) SHA
C) PGP
D) DHE
D) DHE
Which of the following terms refers to a method for managing infrastructure resources through scripts and templates?
A) IaaS
B) ML
C) IaC
D) SDN
C) IaC