CompTIA Security+ Certification Exam SY0-701 Practice Test 2 Flashcards

1
Q

Which of the following terms describes the process of identifying differences between an organization’s current security posture and its desired security posture?

A) Tabletop exercise
B) Gap analysis
C) Security awareness training
D) Risk assessment

A

B) Gap analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term “Zero Trust security” refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.

A) True

B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?

A) Implicit trust
B) Monitoring and logging
C) Adaptive identity
D) Microsegmentation

A

C) Adaptive identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key components of the Zero Trust Control Plane’s Policy Decision Point (PDP)? (Select 2 answers)

A) Policy Engine (PE)
B) Monitoring and logging
C) Policy Enforcement Point (PEP)
D) Microsegmentation
E)Policy Administrator (PA)

A

A) Policy Engine (PE)
E)Policy Administrator (PA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP)

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements about honeypots are true? (Select 2 answers)

A)Honeypots are always part of a honeynet
B)Honeypots mimic real systems to attract cyber attackers
C)Honeypots are a type of anti-malware solution
D)Honeypots contain apparent vulnerabilities that are closely monitored by a security team
E)Honeypots are used to launch attacks on cyber attackers

A

B)Honeypots mimic real systems to attract cyber attackers

D)Honeypots contain apparent vulnerabilities that are closely monitored by a security team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a honeynet in the context of cybersecurity?

A) A network of IDSs
B) A network of honeypots
C) A network of infected hosts
D) A network of IPSs

A

B) A network of honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a honeynet example?

A) A network of fake websites
B) A network of fake servers
C) A network of fake databases
D) A network of fake file shares
E) All of the above

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A honeyfile can be any type of file (e.g., a document, email message, image, or video file) containing real user data intentionally placed within a network or system to attract potential attackers or unauthorized users.

A) True

B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A honeyfile can be used for

A) Attracting cyber attackers
B) Triggering alerts when accessed
C) Monitoring network activity
D) All of the above

A

D) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a honeytoken?

A) A decoy file that is designed to attract attackers ( Your answer)
B) A unique identifier assigned to a honeyfile
C) A decoy system that is designed to lure potential attackers
D) A unique identifier that is designed to track attackers

A

D) A unique identifier that is designed to track attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following should not be used as honeytokens? (Select all that apply)

A) Active user account credentials
B) Database entries mimicking real data
C) Actual URLs to live websites or resources
D) Dummy server logs with enticing information
E) Fake identifiers, including usernames, passwords, email addresses, and IP addresses

A

A) Active user account credentials

C) Actual URLs to live websites or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:

A) BPA
B) BIA
C) SLE
D) BCP

A

B) BIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as

A) PKI
B) RA
C) PKCS
D) CA

A

A) PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the answers listed below best describes the characteristics of a public-private key pair?

A) Both keys are examples of a symmetrical key
B) Two keys that are identical
C) A pair of keys where one is used for encryption and the other for decryption
D) Both keys are examples of a shared key

A

C) A pair of keys where one is used for encryption and the other for decryption

17
Q

What is the typical use of a public key?

A) Data encryption
B) Data decryption
C) User/device authentication
D) All of the above

A

A) Data encryption

18
Q

Key escrow is a cryptographic technique that enables storing copies of encryption keys with a trusted third party. A Recovery Agent (RA) is a trusted third party (an individual, entity, or system) who is authorized to assist in the retrieval of encryption keys and data on behalf of the data owner. Key escrow and RA are both used to ensure that encrypted data can be decrypted even if the data owner loses access to their encryption key. Since key escrow and RAs are both components of a single security solution, the only way to implement key escrow systems is with the use of RAs.

A) True

B) False

A

B) False

19
Q

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

A) HSM
B) TPM
C) EFS
D) SED

A
20
Q

Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?

A) TPM
B) FDE
C) EFS
D) HSM

A

B) FDE

21
Q

An MS Windows component that enables encryption of individual files is called:

A) SED
B) EFS
C) BitLocker
D) FDE

A

B) EFS

22
Q

Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)

A) VPN
B) GPG
C) SSH
D) IPsec
E) PGP

A

B) GPG
E) PGP

23
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption

A) SFTP
B) HTTPS
C) FTPS
D) SNMP

A

B) HTTPS

24
Q

Which of the answers listed below refers to a deprecated TLS-based method for secure transmission of email messages?

A) S/MIME
B) STARTTLS
C) DKIM
D) SMTPS

A

SMTPS

25
Q

Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?

A) SMTPS
B) SRTP
C) SHTTP
D) S/MIME

A

C) SHTTP