CompTIA Security+ Certification Exam SY0-701 Practice Test 19 Flashcards
Which of the following answers refers to a policy framework that allows domain owners to specify how email receivers should handle emails that fail authentication checks?
A) DKIM
B) SPF
C) PEM
D) DMARC
D) DMARC
Which of the answers listed below refers to an authentication method that enables the signing of an outbound email message with a digital signature?
A) SPF
B) DKIM
C) DMARC
D) PEM
B) DKIM
Which of the following answers refers to an email authentication mechanism that allows domain owners to specify which IP addresses are authorized to send emails on behalf of their domain?
A) DMARC
B) PEM
C) DKIM
D) SPF
D) SPF
Which of the answers listed below refers to a cryptographic standard (and a file format) used for the storage and transmission of private keys in email communications?
A) PEM
B) DMARC
C) SPF
D) DKIM
A) PEM
Which of the following solutions would be the best choice for real-time protection against spam and phishing attacks?
A) Email client filter
B) Host-based AV software
C) Email security gateway
D) Cloud-based email service
C) Email security gateway
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
A) DLP
B) SIEM
C) FIM
D) SHA
C) FIM
Which of the following answers refers to a solution that helps organizations mitigate risks associated with data breaches, insider threats, and compliance violations?
A) EDR
B) DLP
C) IAM
D) UTM
B) DLP
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before (pre-admission NAC) and/or after end-stations gain access to the network (post-admission NAC). NAC can be implemented with the use of agent software which can be installed on the client machine permanently (this type of software is referred to as permanent agent) or used only temporarily during checks (this type of software is known as dissolvable agent). Another implementation option is agentless NAC, where checks are performed remotely by an external security device without the need for any client software agents.
A) True
B) False
A) True
Which of the answers listed below refers to a security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level?
A) SWG
B) CASB
C) EDR
D) NGFW
C) EDR
Which of the following answers refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources?
A) XDR
B) WAF
C) EDR
D) SWG
A) XDR
Which of the answers listed below refers to a cybersecurity approach aimed at identifying insider threats, compromised accounts, or malicious activity?
A) Threat intelligence
B) User behavior analytics
C) Security policies and procedures
D) Defense in depth
B) User behavior analytics
Which of the following answers refers to a framework for managing access control to digital resources?
A) PAM
B) SSO
C) IAM
D) MFA
C) IAM
Which of the terms listed below is used to describe the technical process of removing a user’s access to an organization’s systems and resources?
A) De-provisioning
B) Group Policy
C) IAM
D) Offboarding
A) De-provisioning
A general characteristics of a standard user account is that it provides access to basic system resources but does not allow the user to make system changes.
A) True
B) False
A) True
An authentication subsystem in which a single set of authentication credentials provides access to multiple systems across different organizations or security domains is referred to as:
A) Syndication
B) Federation
C) Association
D) Propagation
B) Federation