CompTIA Security+ Certification Exam SY0-701 Practice Test 12 Flashcards
A computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
A) Bridge
B) Active hub
C) Server
D) Proxy
D)
Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?
A) PAC
B) DDNS
C) PAM
D) NAT
A) PAC
Which of the following provides passive network security breach response on an individual computer system?
A) HIDS
B) NIPS
C) HIPS
D) NIDS
A) HIDS
Which of the answers listed below refer to the characteristic features of a NIDS? (Select 3 answers)
A) Takes proactive measures to block or mitigate intrusion attempts
B) Does not take direct action to block or prevent attacks
C) Generates alerts and notifies security personnel or administrators when suspicious activity is detected
D)Monitors network traffic without direct involvement in traffic routing or packet modification
E) Can drop or reject network packets, terminate connections, or take other actions to stop the attack
F) Operates in an inline mode, actively intercepting and inspecting network traffic
B) Does not take direct action to block or prevent attacks
C) Generates alerts and notifies security personnel or administrators when suspicious activity is detected
D)Monitors network traffic without direct involvement in traffic routing or packet modification
Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
A) WIPS
B) NIDS
C) WIDS
D) NIPS
A) WIPS
Which of the following answers refer to a NIPS? (Select 3 answers)
A) Takes proactive measures to block or mitigate intrusion attempts
B) Generates alerts and notifies security personnel or administrators when suspicious activity is detected
C) Operates in an inline mode, actively intercepting and inspecting network traffic
D)Monitors network traffic without direct involvement in traffic routing or packet modification Does not take direct action to block or prevent attacks
E) drop or reject network packets, terminate connections, or take other actions to stop the attack
A) Takes proactive measures to block or mitigate intrusion attempts
C) Operates in an inline mode, actively intercepting and inspecting network traffic
E) drop or reject network packets, terminate connections, or take other actions to stop the attack
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:
A) Content filter
B) Proxy server
C) Load balancer
D) Domain controller
C) Load balancer
In active-active mode, load balancers distribute network traffic across:
A) Least utilized servers
B) None of the servers
C) All servers
D) Most utilized servers
C) All servers
In active-passive mode, load balancers distribute network traffic across:
A) All servers
B) Servers marked as active
C) Least utilized servers
D) Servers marked as passive
B) Servers marked as active
Which of the answers listed below refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?
A) IEEE 802.1X
B) IEEE 802.11ac
C) IEEE 802.1D
D) IEEE 802.11x
A) IEEE 802.1X
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, LEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.
A) True
B) False
A) True
Which of the following EAP methods offers the highest level of security?
A) PEAP
B) EAP-FAST
C) EAP-TLS
D) EAP-TTLS
C) EAP-TLS
A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is called:
A) UTM
B) NGFW
C) UEM
D) WAF
D) WAF
The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
A) True
B) False
A) True
Which of the answers listed below refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?
A) IDS
B) Packet filter
C) NGFW
D) Stateful firewall
C) NGFW