CompTIA Security+ Certification Exam SY0-701 Practice Test 20 Flashcards
Which access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?
A) ABAC
B) MAC
C) RuBAC
D) DAC
E) RBAC
C) RuBAC
Examples of properties used for defining access policies in Attribute-Based Access Control (ABAC) model include:
A) Subject (i.e., user or process requesting access)
B) Type of action (for example “read”, “write”, “execute”)
C) Resource type (medical record, bank account etc.)
D) Environment (contextual data, such as time of day or geolocation)
E) All of the above
E) All of the above
Which access control model defines access control rules with the use of statements that closely resemble natural language?
A) DAC
B) ABAC
C) MAC
D) RBAC
B) ABAC
Which of the access control models listed below enforces the strictest set of access rules?
A) MAC
B) RBAC
C) DAC
D) ABAC
A) MAC
Which of the following access control methods would be the most suitable for scheduling system maintenance tasks during periods of low user activity?
A) Resource provisioning
B) Time-of-day restrictions
C) Principle of least privilege
D) Just-in-time permissions
B) Time-of-day restrictions
The principle of least privilege is a security rule that prevents users from accessing information and resources that lie beyond the scope of their responsibilities.
A) True
B) False
A) True
In the context of IT security, the term “Biometrics” refers to both biological characteristics of the human body and behavioral traits that can be used for identification and access control purposes.
A) True
B) False
A) True
A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is called:
A) FAR
B) CER
C) CRC
D) FRR
D) FRR
Which of the answers listed below refer(s) to a medium type that can be used as a hardware authentication token? (Select all that apply)
A) Smart card
B) Key fob
C) Security key
D) Passphrase
E) Biometric reader
F) RFID badge
A) Smart card
B) Key fob
C) Security key
Which of the following examples does not fall into the category of software authentication tokens?
A) QR code token
B) Security key
C) SMS-based OTP
D) Authenticator app
F)Email-based OTP
B) Security key
Which of the answers listed below refer to the features of a security key? (Select 3 answers)
A) Used for OTP generation, remote vehicle access, and building access
B) Hardware authentication token
C) Typically, a physical USB stick or key fob-sized device
D) Primarily used for digital security (2FA/MFA)
E) Software authentication token
F)Typically, a credit card-sized plastic card with an embedded chip
B) Hardware authentication token
C) Typically, a physical USB stick or key fob-sized device
D) Primarily used for digital security (2FA/MFA)
Authentication process can be based on various categories of authentication factors. These include knowledge-based factors such as usernames, passwords, PINs, or security question answers (“something you know”), possession-based factors (i.e., physical tokens) such as smart cards, key fobs, or security keys (“something you have”), inherence-based factors that include unique physical traits of each individual, such as fingerprints, iris scans, facial recognition, or voice patterns (“something you are”), or location-based factors such as geolocation data or IP addresses (“somewhere you are”). A multifactor authentication system requires the implementation of authentication factors from two or more distinct categories.
A) True
B) False
A) True
The two factors that are considered important for creating strong passwords are: (Select 2 answers)
A) Password length
B) Minimum password age
C) Password history
D) Password complexity
E) Maximum password age
A) Password length
D) Password complexity
A strong password that meets the password complexity requirement should contain: (Select the best answer)
A) Uppercase letters (A-Z)
B) Digits (0-9)
C) Non-alphanumeric characters if permitted (e.g., !, @, #, $)
D) Lowercase letters (a-z)
E) A combination of characters from at least 3 character groups
E) A combination of characters from at least 3 character groups
Which of the following passwords is the most complex?
A) T$7C52WL4SU
B) GdL3tU8wxYz
C) @TxBL$nW@Xt
D) G$L3tU8wY@z
D) G$L3tU8wY@z