CompTIA Security+ Certification Exam SY0-701 Practice Test 13 Flashcards

1
Q

PHI stands for what?

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PIV stands for what?

A

Personal Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII stands for what?

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A) SSL
B) IKE
C) ESP
D) DHE

A

B) IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?

A) CRC
B) AH
C) IKE
D) AES

A

B) AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which part of IPsec provides confidentiality, data integrity, and authentication?

A) AES
B) SHA
C) AH
D) ESP

A

D) ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the IPsec modes provides entire packet encryption?

A) Tunnel
B) Payload
C) Transport
D) Default

A

A) Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:

A) Protected mode
B) Tunnel mode
C) Transport mode
D) Safe mode

A

C) Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term “SD-WAN” refers to a network technology that uses software to manage and optimize network connections that extend over large geographic areas.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refers to a cybersecurity framework that combines network and security functions into a single cloud-based service?

A) SASE
B) SWG
C) CASB
D) SD-WAN

A

A) SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A) PHI
B) Biometrics
C) ID
D) PII

A

D) PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following regulates personal data privacy of the EU citizens?

A) PHI
B) HIPAA
C) PCI DSS
D) GDPR

A

D) GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

A) PII
B) PI
C) PHI
D) PIV

A

C) PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The purpose of PCI DSS is to provide protection for:

A) Credit cardholder data
B) Licensed software
C) User passwords
D) Personal health information

A

A) Credit cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refer(s) to encryption method(s) used to protect data at rest? (Select all that apply)

A) FDE
B) SED
C) IPsec
D) TLS
E) VPN
F) EFS

A

A) FDE
B) SED
F) EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption methods used to protect data in transit include: (Select all that apply)

A) NFS
B) VPN
C) SED
D) IPsec
E) FDE
F) TLS

A

B) VPN
D) IPsec
F) TLS

17
Q

Which of the following data states typically requires data to be processed in an unencrypted form?

A) Data in motion
B) Data at rest
C) Data in transit
D) Data in use

A

D) Data in use

18
Q

Which of the answers listed below refer to examples of non-human readable data types? (Select 2 answers)

A) Binary code
B) XML files
C) Machine language
D) HTML code
E) SQL queries

A

A) Binary code
C) Machine language

19
Q

Which of the following answers refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?

A) CTO
B) DPO
C) CIO
D) CSO

A

B) DPO

20
Q

A mobile device’s built-in functionality enabling the usage of locator applications is known as:

A) WPS
B) GSM
C) SIM
D) GPS

A

D) GPS

21
Q

Which of the following converts plaintext data into ciphertext using an algorithm and a key?

A) Encryption
B) Masking
C) Tokenization
D) Obfuscation

A

A) Encryption

21
Q

Which of the answers listed below refers to a technology that provides control over the usage of a mobile device within a designated area?

A) Geofencing
B) Device tracking
C) Perimeter security
D) Geolocation

A

A) Geofencing

22
Q

Which of the answers listed below refers to a technique that enables converting input data into a fixed-size string, making it difficult to reverse or retrieve the original data?

A) Obfuscation
B) Tokenization
C) Hashing
D) Encryption

A

C) Hashing

23
Q

Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?

A) Tokenization
B) Encryption
C) Obfuscation
D) Hashing

A

C) Obfuscation

23
Q

Which of the following answers refer to data masking? (Select 2 answers)

A) Replaces sensitive data with fictitious or modified data while retaining its original format

B) Allows for data manipulation in environments where the actual values are not needed

C) Transforms data into an unreadable format using an algorithm and an encryption key

D) Creates a unique, fixed-length string from the original data

E) Replaces sensitive data with a non-sensitive identifier that has no meaning or value outside the specific system

F)

A

A) Replaces sensitive data with fictitious or modified data while retaining its original format

B) Allows for data manipulation in environments where the actual values are not needed

24
Q

Which of the answers listed below refers to a situation where sensitive data is stored in a separate location and can be retrieved with a non-sensitive replacement that can also be processed just like the original data without the risk of revealing the contents of original data?

A) Masking
B) Obfuscation
C) Encryption
D) Tokenization

A

D) Tokenization

25
Q

Which of the answers listed below refer to the advantages of segmentation as a method for securing data? (Select 3 answers)

A) Enhances security by limiting the spread of cyberattacks

B) Helps organizations comply with data regulatory requirements by isolating and protecting specific data types

C) Provides security for data in transit with the use of encryption

D) Guarantees data recovery in case of accidental deletion or system failures

E) Provides better control over user access to sensitive data

A

A) Enhances security by limiting the spread of cyberattacks

B) Helps organizations comply with data regulatory requirements by isolating and protecting specific data types

E) Provides better control over user access to sensitive data

26
Q

ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.

A) True

B) False

A

A) True