CompTIA Security+ Certification Exam SY0-701 Practice Test 1 Flashcards

1
Q

Which of the following answers can be used to describe technical security controls? (Select 3 answers)

A) Focused on protecting material assets

B) Sometimes called logical security controls

C) Executed by computer systems (instead of people)

D) Also known as administrative controls

E) Implemented with technology

F) Primarily implemented and executed by people (as opposed to computer systems)

A

B) Sometimes called logical security controls

C) Executed by computer systems (instead of people)

E) Implemented with technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refer to examples of technical security controls? (Select 3 answers)

A) Security audits
B) Encryption
C) Organizational security policy
D) IDSs
E) Configuration management
F)Firewalls

A

B) Encryption
D) IDSs
F)Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refer to the characteristic features of managerial security controls? (Select 3 answers)

A) Also known as administrative controls

B) Sometimes referred to as logical security controls

C) Focused on reducing the risk of security incidents

D) Executed by computer systems (instead of people)

E) Documented in written policies

F) Focused on protecting material assets

A

A) Also known as administrative controls

C) Focused on reducing the risk of security incidents

E) Documented in written policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of managerial security controls include: (Select 3 answers)

A) Configuration management

B) Data backups

C) Organizational security policy

D) Risk assessments

E) Security awareness training

A

C) Organizational security policy

D) Risk assessments

E) Security awareness training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the answers listed below can be used to describe operational security controls (Select 3 answers)

A) Also known as administrative controls

B) Focused on the day-to-day procedures of an organization

C) Executed by computer systems (instead of people)

D) Used to ensure that the equipment continues to work as specified

E) Focused on managing risk

F) Primarily implemented and executed by people (as opposed to computer systems)

A

B) Focused on the day-to-day procedures of an organization

D) Used to ensure that the equipment continues to work as specified

F) Primarily implemented and executed by people (as opposed to computer systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following examples fall into the category of operational security controls? (Select 3 answers)

A) Risk assessments

B) Configuration management

C) System backups

D) Authentication protocols

E) Patch management

A

B) Configuration management

C) System backups

E) Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refers to security controls designed to deter, detect, and prevent unauthorized access, theft, damage, or destruction of material assets?

A) Managerial security controls
B) Physical security controls
C) Technical security controls
D) Operational security controls

A

B) Physical security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following examples do not fall into the category of physical security controls? (Select 3 answers)

A) Lighting
B) Access control vestibules
C) Data backups
D) Fencing/Bollards/Barricades
E) Firewalls
F) Security guards
G) Asset management

A

C) Data backups

E) Firewalls

G) Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the examples of preventive security controls? (Select 3 answers)

A) Encryption
B) IDS
C) Sensors
D) Firewalls
E) Warning signs
F) AV software

A

A) Encryption

D) Firewalls

F) AV software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of deterrent security controls include: (Select 3 answers)

A) Warning signs
B) Sensors
C) Lighting
D) Video surveillance
E) Security audits
F) Fencing/Bollards

A

A) Warning signs

C) Lighting

F) Fencing/Bollards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refer(s) to detective security control(s)? (Select all that apply)

A) Lighting
B) Log monitoring
C) Sandboxing
D) Security audits
E) CCTV
F) IDS
G) Vulnerability scanning

A

B) Log monitoring

D) Security audits

E) CCTV

F) IDS

G) Vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refer(s) to corrective security control(s)? (Select all that apply)

A) Recovering data from backup copies

B) Applying software updates and patches to fix vulnerabilities

C) Developing and implementing IRPs to respond to and recover from security incidents

D) Regularly reviewing logs for anomalies or patterns indicative of attacks

E) Activating and executing DRPs to restore operations after a major incident

A

A) Recovering data from backup copies

B) Applying software updates and patches to fix vulnerabilities

C) Developing and implementing IRPs to respond to and recover from security incidents

E) Activating and executing DRPs to restore operations after a major incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refer(s) to compensating security control(s)? (Select all that apply)

A) Backup power systems
B) Video surveillance
C) MFA
D) Application sandboxing
E) Network segmentation

A

A) Backup power systems

C) MFA

D) Application sandboxing

E) Network segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The term “Directive security controls” refers to the category of security controls that are implemented through policies and procedures.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following terms fall into the category of directive security controls? (Select 2 answers)

A) IRP
B) AUP
C) IDS
D) MFA
E) IPS

A

A) IRP

B) AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the terms listed below can be used to describe the basic principles of information security?

A) PKI
B) AAA
C) GDPR
D) CIA

A

D) CIA

17
Q

The term “Non-repudiation” describes the inability to deny responsibility for performing a specific action. In the context of data security, non-repudiation ensures data confidentiality, provides proof of data integrity, and proof of data origin.

A) True
B) False

A

B) False

18
Q

Which of the following best applies to the concept of non-repudiation?

A) Digital certificate
B) MFA
C) Hashing
D) Encryption

A

A) Digital certificate

19
Q

Which type of user account violates the concept of non-repudiation?

A) Standard user account
B) Shared account
C) Guest user account
D) Service account

A

B) Shared account

20
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A) Authentication
B) Authorization
C) Accounting

A

A) Authentication

21
Q

In the AAA security architecture, the process of granting or denying access to resources is known as:

A) Authentication
B) Authorization
C) Accounting

A

B) Authorization

22
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A) Authentication
B) Authorization
C) Accounting

A

C) Accounting

23
Q

Which of the following solutions provide(s) the AAA functionality? (Select all that apply)

A) CHAP
B) TACACS+
C) PAP
D) RADIUS
E) MS-CHAP

A

B) TACACS+

D) RADIUS

24
Q

In the context of the AAA framework, common methods for authenticating people include: (Select 3 answers)

A) IP addresses
B) Usernames and passwords
C) MAC addresses
D) Biometrics
E) MFA

A

B) Usernames and passwords

D) Biometrics

E) MFA

25
Q

Which of the answers listed below refer to common methods of device authentication used within the AAA framework? (Select 3 answers)

A) Usernames and passwords
B) Digital certificates
C) IP addresses
D) MFA
E) Biometric authentication
F) MAC addresses

A

B) Digital certificates

C) IP addresses

F) MAC addresses