CompTIA Security+ Certification Exam SY0-701 Practice Test 12 Flashcards

1
Q

A computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A) Bridge
B) Active hub
C) Server
D) Proxy

A

D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?

A) PAC
B) DDNS
C) PAM
D) NAT

A

A) PAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following provides passive network security breach response on an individual computer system?

A) HIDS
B) NIPS
C) HIPS
D) NIDS

A

A) HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refer to the characteristic features of a NIDS? (Select 3 answers)

A) Takes proactive measures to block or mitigate intrusion attempts

B) Does not take direct action to block or prevent attacks

C) Generates alerts and notifies security personnel or administrators when suspicious activity is detected

D)Monitors network traffic without direct involvement in traffic routing or packet modification

E) Can drop or reject network packets, terminate connections, or take other actions to stop the attack

F) Operates in an inline mode, actively intercepting and inspecting network traffic

A

B) Does not take direct action to block or prevent attacks

C) Generates alerts and notifies security personnel or administrators when suspicious activity is detected

D)Monitors network traffic without direct involvement in traffic routing or packet modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?

A) WIPS
B) NIDS
C) WIDS
D) NIPS

A

A) WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following answers refer to a NIPS? (Select 3 answers)

A) Takes proactive measures to block or mitigate intrusion attempts

B) Generates alerts and notifies security personnel or administrators when suspicious activity is detected

C) Operates in an inline mode, actively intercepting and inspecting network traffic

D)Monitors network traffic without direct involvement in traffic routing or packet modification Does not take direct action to block or prevent attacks

E) drop or reject network packets, terminate connections, or take other actions to stop the attack

A

A) Takes proactive measures to block or mitigate intrusion attempts

C) Operates in an inline mode, actively intercepting and inspecting network traffic

E) drop or reject network packets, terminate connections, or take other actions to stop the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:

A) Content filter
B) Proxy server
C) Load balancer
D) Domain controller

A

C) Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In active-active mode, load balancers distribute network traffic across:

A) Least utilized servers
B) None of the servers
C) All servers
D) Most utilized servers

A

C) All servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In active-passive mode, load balancers distribute network traffic across:

A) All servers
B) Servers marked as active
C) Least utilized servers
D) Servers marked as passive

A

B) Servers marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

A) IEEE 802.1X
B) IEEE 802.11ac
C) IEEE 802.1D
D) IEEE 802.11x

A

A) IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, LEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following EAP methods offers the highest level of security?

A) PEAP
B) EAP-FAST
C) EAP-TLS
D) EAP-TTLS

A

C) EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is called:

A) UTM
B) NGFW
C) UEM
D) WAF

A

D) WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?

A) IDS
B) Packet filter
C) NGFW
D) Stateful firewall

A

C) NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following answers refer to the characteristic features of a Layer 4 firewall? (Select 3 answers)

A) Operates at the application layer of the OSI model

B) Offers complex (slower) traffic filtering

C) traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP)

D) Offers basic (faster) traffic filtering

E) Operates at the transport layer of the OSI model

F) Adds the ability to inspect the contents of data packets in addition to the header information

A

C) traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP)

D) Offers basic (faster) traffic filtering

E) Operates at the transport layer of the OSI model

16
Q

Which of the answers listed below refer to a Layer 7 firewall? (Select 3 answers)

A) Offers complex (slower) traffic filtering

B) Filters traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP)

C) Operates at the transport layer of the OSI model

D) Adds the ability to inspect the contents of data packets in addition to the header information

E) Offers basic (faster) traffic filtering

F) Operates at the application layer of the OSI model

A

A) Offers complex (slower) traffic filtering

D) Adds the ability to inspect the contents of data packets in addition to the header information

F) Operates at the application layer of the OSI model

17
Q

Examples of protocols typically used for implementing secure VPN tunnels include: (Select all that apply)

A) IPsec
B) SRTP
C) TLS
D) bcrypt
E) L2TP

A

A) IPsec
C) TLS
E) L2TP

18
Q

Which of the following terms is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?

A) Split tunnel
B) Clientless
C) Full tunnel
D) Remote access

A

A) Split tunnel

19
Q

Which VPN type is used for connecting computers to a network? (Select 2 answers)

A) Remote access
B) Intranet-based
C) Client-to-site
D) Site-to-site
E) Extranet-based

A

A) Remote access
C) Client-to-site

20
Q

Which type of VPN enables connectivity between two networks?

A) Site-to-site
B) Host-to-network
C) Remote access
D) Client-to-site

A

A) Site-to-site

21
Q

Which of the answers listed below refers to a hardware or software solution providing secure remote access to networks and resources?

A) NAC
B) RDP
C) SSH
D) RAS

A

D) RAS

22
Q

Which of the following answers refers to a protocol designed to secure data transmitted over WLANs?

A) SCP
B) IPsec
C) SSH
D) WTLS

A

D) WTLS

23
Q

Which of the following answers refers to network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?

A) WIPS
B) NIDS
C) WIDS
D) NIPS

A

A) WIPS

24
Q

An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.

A) True

B) False

A

A) True