CompTIA Security+ Quiz 9 Flashcards
Which of the following solutions would be best suited for a company that needs comprehensive IT services but lacks qualified IT personnel?
A) MSA
B) MaaS
C) MSP
D) MSSP
C) MSP
Which of the terms listed below refers to a third-party vendor offering IT security management services?
A) MSP
B) MaaS
C) MSA
D) MSSP
D) MSSP
Which of the following acronyms refers to the broad category of hardware and software systems used for monitoring and controlling physical devices, processes, and industrial operations?
A) ICS
B) OT
C) SCADA
D) EDR
B) OT
Which of the answers listed below refers to a basic method for establishing a dedicated point-to-point link between two networked devices?
A) PPTP
B) IGMP
C) PPP
D) MPLS
C) PPP
Which of the following defines the maximum acceptable amount of data loss measured by a specific point in time before a disaster or outage?
A) RPO
B) MTBF
C) RTO
D) MTTR
A) RPO
Which of the terms listed below refers to a framework for managing access to digital resources?
A) PAM
B) SSO
C) IAM
D) MFA
C) IAM
Which of the following answers refer to SCAP? (Select 3 answers)
A) A type of security system designed to collect logs and events from various sources
B) Designed to provide a centralized user interface for accessing collected data
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
F) Enables real-time threat detection, incident response, and compliance monitoring
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
A Windows feature used for centrally managing and enforcing policies and settings for users and computers in a network is referred to as:
A) SAE
B) NTLM
C) GPO
D) SSO
C) GPO
Which of the answers listed below refers to a protocol used for automating the issuance and management of certificates within a PKI environment?
A) PKCS
B) SCEP
C) CSR
D) OCSP
B) SCEP
Which of the answers listed below describe the characteristics of a non-persistent VDI? (Select 2 answers)
A) At the end of a session, user desktop reverts to its original state
B) Each user runs their own copy of virtual desktop
C) At the end of a session, user data and personal settings are saved
D) Virtual desktop is shared among multiple users
A) At the end of a session, user desktop reverts to its original state
D) Virtual desktop is shared among multiple users
Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?
A) SMTPS
B) SRTP
C) SHTTP
D) S/MIME
C) SHTTP
In a persistent VDI: (Select 2 answers)
A) Each user runs their own copy of virtual desktop
B) At the end of a session, user desktop reverts to its original state
C) Virtual desktop is shared among multiple users
D) At the end of a session, user data and personal settings are saved
A) Each user runs their own copy of virtual desktop
D) At the end of a session, user data and personal settings are saved
An authentication mechanism that generates one-time passwords based on a counter value and a secret key is known as:
A) OAuth
B) HOTP
C) RADIUS
D) TOTP
B) HOTP
Which of the acronyms listed below refers to a documented process for addressing identified issues and preventing their repetition?
A) DRP
B) COOP
C) QA
D) CAR
D) CAR
Which of the following answers refers to a software tool designed to simplify the process of creating and maintaining online content?
A) VDI
B) SaaS
C) CMS
D) SDK
C) CMS
Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?
A) CBC
B) GCM
C) ECB
D) CFB
B) GCM
The term “FPGA” refers to a reconfigurable integrated circuit that can be programmed and customized to perform various digital functions and tasks.
A) True
B) False
A) True
Which of the answers listed below refer to SIEM? (Select 3 answers)
A) Allows different security tools to share data and work together more effectively
B) Designed to provide a centralized user interface for accessing collected data
C) A collection of standards developed by NIST
D) Enables real-time threat detection, incident response, and compliance monitoring
E) A type of security system designed to collect logs and events from various sources
F) Provides a common language for communicating security information
B) Designed to provide a centralized user interface for accessing collected data
D) Enables real-time threat detection, incident response, and compliance monitoring
E) A type of security system designed to collect logs and events from various sources
Which of the following answers refers to a trusted third-party service for validating user identity in a federated identity system?
A) RA
B) IdP
C) CA
D) Kerberos
B) IdP
Which of the answers listed below refers to a deprecated TLS-based method for securing SMTP?
A) IDPS
B) STARTTLS
C) DKIM
D) SMTPS
D) SMTPS
Which of the following enables running macros in Microsoft Office applications?
A) DOM
B) API
C) DLL
D) VBA
D) VBA
Which of the answers listed below refers to a language used to structure and describe data in a format that is both human- and machine-readable?
A) HTML
B) XML
C) JSON
D) XHTML
B) XML
In SNMP, each node in a MIB is uniquely identified by a(n):
A) OID
B) IP
C) OUI
D) MAC
A) OID
Which of the following acronyms refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?
A) CBC
B) GCM
C) ECB
D) CFB
A) CBC