CompTIA Security+ Certification Exam SY0-701 Practice Test 18 Flashcards

1
Q

In SNMP, each node in a MIB is uniquely identified by a(n):

A) DSU
B) OID
C) CSU
D) OUI

A

B) OID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a network protocol developed by Cisco for collecting information about IP traffic flowing across network devices like routers, switches, and firewalls?

A) OpenVAS
B) iPerf
C) pfSense
D) NetFlow

A

D) NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall rules are evaluated based on their order of precedence. Rules at the top of the list take precedence over rules further down the list. Once a matching rule is found, no further evaluation of subsequent rules occurs. The “implicit deny” policy on a firewall is a common default behavior in which any traffic that does not explicitly match any of the configured allow rules is automatically denied or blocked. In other words, if a packet does not meet the criteria of any allow rule, the default behavior of the firewall is to deny the traffic.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following refers to a set of rules defining how a firewall manages network traffic?

A) MAC
B) ACL
C) NAC
D) DLP

A

B) ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A lightly protected subnet (a.k.a. DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is known as:

A) Captive portal
B) Quarantine network
C) Extranet
D) Screened subnet

A

D) Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below most accurately describes patterns or behaviors observed in network traffic over time?

A) Trends
B) Anomalies
C) Threats
D) Signatures

A

A) Trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following terms refers to predefined patterns or characteristics of known threats or attack methods?

A) Security logs
B) Baselines
C) Trends
D) Signatures

A

D) Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of IDS/IPS that compares current network traffic against a database of known attack patterns is called:

A) Heuristic
B) Anomaly-based
C) Behavioral
D) Signature-based

A

D) Signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Agent-based web filtering: (Select 3 answers)

A) Requires installing software on each device that needs to be monitored

B) Provides flexibility and granular control over web activity at the device level

C) Involves increased management overhead and system resource consumption

D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network

E) Does not require software to be installed on each individual device

F) Requires a functioning central server for web filtering to operate

A

A) Requires installing software on each device that needs to be monitored

B) Provides flexibility and granular control over web activity at the device level

C) Involves increased management overhead and system resource consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web filtering via centralized proxy: (Select 3 answers)

A) Involves increased management overhead and system resource consumption

B) Does not require software to be installed on each individual device

C) Requires installing software on each device that needs to be monitored

D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network

E) Provides flexibility and granular control over web activity at the device level

F) Requires a functioning central server for web filtering to operate

A

B) Does not require software to be installed on each individual device

D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network

F) Requires a functioning central server for web filtering to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Content categorization in web filtering involves classifying web content into predefined categories based on its subject matter or type. This technique enables organizations to apply filtering policies selectively, for example restricting access to certain categories during work hours or blocking access to categories associated with security risks or non-work-related activities.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

A) Local Users and Groups
B) Resource Monitor
C) Group Policy
D) User Account Control

A

C) Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SELinux?

A) A security feature in Linux OSs

B) A secure boot mechanism implemented in certain Linux distributions

C) An open-source web server software

D) A Linux distribution

A

A) A security feature in Linux OSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a security mechanism imposed by SELinux over system access?

A) DAC
B) RBAC
C) MAC
D) ABAC

A

C) MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the protocols listed below is used to enable secure web browsing?

A) L2TP
B) HTTPS
C) SSH
D) IPsec

A

B) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following protocols allow(s) for secure file transfer? (Select all that apply)

A) FTPS
B) TFTP
C) FTP
D) SFTP

A

A) FTPS

D) SFTP

17
Q

FTPS is an extension to the SSH protocol and runs by default on TCP port 22.

A) True
B) False

A

B) False

18
Q

Which of the answers listed below refers to a secure replacement for Telnet?

A) RSH
B) IPsec
C) SSH
D) RTPS

A

C) SSH

19
Q

Which of the following answers refers to a deprecated protocol designed as a secure way to send emails from a client to a mail server and between mail servers?

A) IMAPS
B) SFTP
C) POP3S
D) SMTPS

A

D) SMTPS

20
Q

Which of the protocols listed below enable secure retrieval of emails from a mail server to an email client? (Select 2 answers)

A) FTPS
B) IMAPS
C) POP3S
D) STARTTLS
E) SMTPS

A

B) IMAPS

C) POP3S

21
Q

Which of the following protocols enables secure access and management of emails on a mail server from an email client?

A) POP3S
B) SMTPS
C) IMAPS
D) S/MIME

A

C) IMAPS

22
Q

Which of the answers listed below refers to a secure network protocol used to provide encryption, authentication, and integrity for real-time multimedia communication?

A) IPsec
B) SIP
C) VoIP
D) SRTP

A

D) SRTP

23
Q

UDP is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data.

A) True
B) False

A

B) False

24
Q

TCP is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data.

A) True
B) False

A

B) False

25
Q

Which of the answers listed below refer to filtering techniques that can allow or block access to a site based on its web address? (Select 2 answers)

A) SSL/TLS inspection
B) URL scanning
C) Content categorization
D) DNS filtering
E) Reputation-based filtering

A

B) URL scanning
D) DNS filtering