CompTIA Security+ Certification Exam SY0-701 Practice Test 18 Flashcards
In SNMP, each node in a MIB is uniquely identified by a(n):
A) DSU
B) OID
C) CSU
D) OUI
B) OID
Which of the answers listed below refers to a network protocol developed by Cisco for collecting information about IP traffic flowing across network devices like routers, switches, and firewalls?
A) OpenVAS
B) iPerf
C) pfSense
D) NetFlow
D) NetFlow
Firewall rules are evaluated based on their order of precedence. Rules at the top of the list take precedence over rules further down the list. Once a matching rule is found, no further evaluation of subsequent rules occurs. The “implicit deny” policy on a firewall is a common default behavior in which any traffic that does not explicitly match any of the configured allow rules is automatically denied or blocked. In other words, if a packet does not meet the criteria of any allow rule, the default behavior of the firewall is to deny the traffic.
A) True
B) False
A) True
Which of the following refers to a set of rules defining how a firewall manages network traffic?
A) MAC
B) ACL
C) NAC
D) DLP
B) ACL
A lightly protected subnet (a.k.a. DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is known as:
A) Captive portal
B) Quarantine network
C) Extranet
D) Screened subnet
D) Screened subnet
Which of the answers listed below most accurately describes patterns or behaviors observed in network traffic over time?
A) Trends
B) Anomalies
C) Threats
D) Signatures
A) Trends
Which of the following terms refers to predefined patterns or characteristics of known threats or attack methods?
A) Security logs
B) Baselines
C) Trends
D) Signatures
D) Signatures
A type of IDS/IPS that compares current network traffic against a database of known attack patterns is called:
A) Heuristic
B) Anomaly-based
C) Behavioral
D) Signature-based
D) Signature-based
Agent-based web filtering: (Select 3 answers)
A) Requires installing software on each device that needs to be monitored
B) Provides flexibility and granular control over web activity at the device level
C) Involves increased management overhead and system resource consumption
D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network
E) Does not require software to be installed on each individual device
F) Requires a functioning central server for web filtering to operate
A) Requires installing software on each device that needs to be monitored
B) Provides flexibility and granular control over web activity at the device level
C) Involves increased management overhead and system resource consumption
Web filtering via centralized proxy: (Select 3 answers)
A) Involves increased management overhead and system resource consumption
B) Does not require software to be installed on each individual device
C) Requires installing software on each device that needs to be monitored
D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network
E) Provides flexibility and granular control over web activity at the device level
F) Requires a functioning central server for web filtering to operate
B) Does not require software to be installed on each individual device
D) Simplifies administration and ensures consistent enforcement of web filtering policies across the network
F) Requires a functioning central server for web filtering to operate
Content categorization in web filtering involves classifying web content into predefined categories based on its subject matter or type. This technique enables organizations to apply filtering policies selectively, for example restricting access to certain categories during work hours or blocking access to categories associated with security risks or non-work-related activities.
A) True
B) False
A) True
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
A) Local Users and Groups
B) Resource Monitor
C) Group Policy
D) User Account Control
C) Group Policy
What is SELinux?
A) A security feature in Linux OSs
B) A secure boot mechanism implemented in certain Linux distributions
C) An open-source web server software
D) A Linux distribution
A) A security feature in Linux OSs
Which of the following answers refers to a security mechanism imposed by SELinux over system access?
A) DAC
B) RBAC
C) MAC
D) ABAC
C) MAC
Which of the protocols listed below is used to enable secure web browsing?
A) L2TP
B) HTTPS
C) SSH
D) IPsec
B) HTTPS