CompTIA Security+ Certification Exam SY0-701 Practice Test 20 Flashcards

1
Q

Which access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?

A) ABAC
B) MAC
C) RuBAC
D) DAC
E) RBAC

A

C) RuBAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of properties used for defining access policies in Attribute-Based Access Control (ABAC) model include:

A) Subject (i.e., user or process requesting access)
B) Type of action (for example “read”, “write”, “execute”)
C) Resource type (medical record, bank account etc.)
D) Environment (contextual data, such as time of day or geolocation)
E) All of the above

A

E) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which access control model defines access control rules with the use of statements that closely resemble natural language?

A) DAC
B) ABAC
C) MAC
D) RBAC

A

B) ABAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the access control models listed below enforces the strictest set of access rules?

A) MAC
B) RBAC
C) DAC
D) ABAC

A

A) MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following access control methods would be the most suitable for scheduling system maintenance tasks during periods of low user activity?

A) Resource provisioning
B) Time-of-day restrictions
C) Principle of least privilege
D) Just-in-time permissions

A

B) Time-of-day restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The principle of least privilege is a security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the context of IT security, the term “Biometrics” refers to both biological characteristics of the human body and behavioral traits that can be used for identification and access control purposes.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is called:

A) FAR
B) CER
C) CRC
D) FRR

A

D) FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refer(s) to a medium type that can be used as a hardware authentication token? (Select all that apply)

A) Smart card
B) Key fob
C) Security key
D) Passphrase
E) Biometric reader
F) RFID badge

A

A) Smart card

B) Key fob

C) Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following examples does not fall into the category of software authentication tokens?

A) QR code token
B) Security key
C) SMS-based OTP
D) Authenticator app
F)Email-based OTP

A

B) Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refer to the features of a security key? (Select 3 answers)

A) Used for OTP generation, remote vehicle access, and building access

B) Hardware authentication token

C) Typically, a physical USB stick or key fob-sized device

D) Primarily used for digital security (2FA/MFA)

E) Software authentication token

F)Typically, a credit card-sized plastic card with an embedded chip

A

B) Hardware authentication token

C) Typically, a physical USB stick or key fob-sized device

D) Primarily used for digital security (2FA/MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication process can be based on various categories of authentication factors. These include knowledge-based factors such as usernames, passwords, PINs, or security question answers (“something you know”), possession-based factors (i.e., physical tokens) such as smart cards, key fobs, or security keys (“something you have”), inherence-based factors that include unique physical traits of each individual, such as fingerprints, iris scans, facial recognition, or voice patterns (“something you are”), or location-based factors such as geolocation data or IP addresses (“somewhere you are”). A multifactor authentication system requires the implementation of authentication factors from two or more distinct categories.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The two factors that are considered important for creating strong passwords are: (Select 2 answers)

A) Password length
B) Minimum password age
C) Password history
D) Password complexity
E) Maximum password age

A

A) Password length

D) Password complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A strong password that meets the password complexity requirement should contain: (Select the best answer)

A) Uppercase letters (A-Z)
B) Digits (0-9)
C) Non-alphanumeric characters if permitted (e.g., !, @, #, $)
D) Lowercase letters (a-z)
E) A combination of characters from at least 3 character groups

A

E) A combination of characters from at least 3 character groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following passwords is the most complex?

A) T$7C52WL4SU
B) GdL3tU8wxYz
C) @TxBL$nW@Xt
D) G$L3tU8wY@z

A

D) G$L3tU8wY@z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which password policy would be the most effective in decreasing the risk of a security breach across multiple accounts?

A) Password expiration policy
B) Minimum password age policy
C) Password reuse policy
D) Maximum password age policy

A

C) Password reuse policy

17
Q

Which password policy enforces a mandatory password change after a specific time?

A) Password expiration policy
B) Password history policy
C) Minimum password age policy
D) Password reuse policy

A

A) Password expiration policy

18
Q

The minimum password age policy setting determines the period of time that a password can be used before the system requires the user to change it.

A) True
B) False

A

B) False

19
Q

The maximum password age policy setting determines the period of time that a password must be used before the user can change it.

A) True
B) False

A

B) False

20
Q

Which of the answers listed below refers to a software tool specifically designed to store and manage login credentials?

A) BitLocker
B) Password manager
C) Key escrow
D) Password vault

A

B) Password manager

21
Q

Which of the following technologies cannot be used as a passwordless authentication method?

A) Biometrics

B) Hardware tokens

C) QR codes

D) OTPs

E) Passkeys

F) All of the above can be used as a means for passwordless authentication

A

F) All of the above can be used as a means for passwordless authentication

22
Q

A security solution that provides control over elevated (i.e., administrative type) accounts is referred to as:

A) MFA
B) IAM
C) SSO
D) PAM

A

D) PAM

23
Q

Which of the answers listed below refers to a solution designed to minimize the risk of unauthorized access to privileged accounts?

A) Principle of least privilege
B) Just-in-time-permissions
C) Passwordless authentication
D) Multifactor authentication

A

B) Just-in-time-permissions

24
Q

Which of the following answers refers to an encrypted database that provides secure storage space for user credentials?

A) Secure enclave
B) Password manager
C) Rainbow table
D) Password vault

A

D) Password vault

25
Q

Which of the terms listed below refer(s) to the concept of ephemeral access, where access to systems, resources, or permissions is provided for a limited duration? (Select all that apply)

A) TOTP

B) OTP

C) Just-in-time permissions

D) User password

E) API key

A

A) TOTP

B) OTP

C) Just-in-time permissions