CompTIA Security+ Certification Exam SY0-701 Practice Test 19 Flashcards
Which of the following answers refers to a policy framework that allows domain owners to specify how email receivers should handle emails that fail authentication checks?
A) DKIM
B) SPF
C) PEM
D) DMARC
D) DMARC
Which of the answers listed below refers to an authentication method that enables the signing of an outbound email message with a digital signature?
A) SPF
B) DKIM
C) DMARC
D) PEM
B) DKIM
Which of the following answers refers to an email authentication mechanism that allows domain owners to specify which IP addresses are authorized to send emails on behalf of their domain?
A) DMARC
B) PEM
C) DKIM
D) SPF
D) SPF
Which of the answers listed below refers to a cryptographic standard (and a file format) used for the storage and transmission of private keys in email communications?
A) PEM
B) DMARC
C) SPF
D) DKIM
A) PEM
Which of the following solutions would be the best choice for real-time protection against spam and phishing attacks?
A) Email client filter
B) Host-based AV software
C) Email security gateway
D) Cloud-based email service
C) Email security gateway
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
A) DLP
B) SIEM
C) FIM
D) SHA
C) FIM
Which of the following answers refers to a solution that helps organizations mitigate risks associated with data breaches, insider threats, and compliance violations?
A) EDR
B) DLP
C) IAM
D) UTM
B) DLP
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before (pre-admission NAC) and/or after end-stations gain access to the network (post-admission NAC). NAC can be implemented with the use of agent software which can be installed on the client machine permanently (this type of software is referred to as permanent agent) or used only temporarily during checks (this type of software is known as dissolvable agent). Another implementation option is agentless NAC, where checks are performed remotely by an external security device without the need for any client software agents.
A) True
B) False
A) True
Which of the answers listed below refers to a security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level?
A) SWG
B) CASB
C) EDR
D) NGFW
C) EDR
Which of the following answers refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources?
A) XDR
B) WAF
C) EDR
D) SWG
A) XDR
Which of the answers listed below refers to a cybersecurity approach aimed at identifying insider threats, compromised accounts, or malicious activity?
A) Threat intelligence
B) User behavior analytics
C) Security policies and procedures
D) Defense in depth
B) User behavior analytics
Which of the following answers refers to a framework for managing access control to digital resources?
A) PAM
B) SSO
C) IAM
D) MFA
C) IAM
Which of the terms listed below is used to describe the technical process of removing a user’s access to an organization’s systems and resources?
A) De-provisioning
B) Group Policy
C) IAM
D) Offboarding
A) De-provisioning
A general characteristics of a standard user account is that it provides access to basic system resources but does not allow the user to make system changes.
A) True
B) False
A) True
An authentication subsystem in which a single set of authentication credentials provides access to multiple systems across different organizations or security domains is referred to as:
A) Syndication
B) Federation
C) Association
D) Propagation
B) Federation
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is known as:
A) NAC
B) SSO
C) AAA
D) MFA
B) SSO
Which of the following answers refers to a protocol designed for accessing and managing information related to user accounts, groups, devices, and other resources within an organization?
A) SOAP
B) RDP
C) LDAP
D) SAML
C) LDAP
OAuth is an open standard for:
A) Auditing
B) Authentication
C) Authorization
D) Attestation
C) Authorization
OpenID Connect is a protocol used for:
A) Attestation
B) Authorization
C) Auditing
D) Authentication
D) Authentication
A common implementation of identity and access controls used in federated SSO systems includes OpenID Connect and OAuth 2.0 used in conjunction to provide authentication and authorization services.
A) True
B) False
A) True
What are the characteristic features of SAML? (Select 3 answers)
A) Enables only the exchange of SSO authorization data
B) Handles both authentication and authorization for SSO
C) Uses XML for data exchange
D) Commonly used in enterprise environments and legacy systems
E) Enables only the exchange of SSO authentication data
F) Uses JSON for data exchange
G) Specifically designed for web and mobile applications
B) Handles both authentication and authorization for SSO
C) Uses XML for data exchange
D) Commonly used in enterprise environments and legacy systems
Which of the terms listed below refers to the process of confirming the integrity and compliance status of various components such as devices, software, configurations, and user privileges?
A) Attestation
B) Authentication
C) Auditing
D) Authorization
Which of the following answers refer(s) to the Mandatory Access Control (MAC) model? (Select all that apply)
A) Users are not allowed to change access policies at their own discretion
B) Labels and clearance levels can only be applied and changed by an administrator
C) Every object has an owner who at his/her own discretion determines what kind of permissions other users can have to that object
D) Access to resources based on user identity
E) Every resource has a sensitivity label matching a clearance level assigned to a user
A) Users are not allowed to change access policies at their own discretion
B) Labels and clearance levels can only be applied and changed by an administrator
E) Every resource has a sensitivity label matching a clearance level assigned to a user
Discretionary Access Control (DAC) is an access control model based on user identity. In DAC, every object has an owner who at his/her own discretion determines what kind of permissions other users can have for that object.
A) True
B) False
A) True
Which type of control access model connects user permissions to their specific responsibilities?
A) DAC
B) RBAC
C) MAC
D) ABAC
B) RBAC