CompTIA Security+ Quiz 1 Flashcards

1
Q

A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:

A) MFA
B) CAPTCHA
C) ACL
D) NIPS

A

B) CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the recommended replacement for DES?

A) DSA
B) RSA
C) RC4
D) AES

A

D) AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the terms listed below refers to the process of creating and maintaining computer applications?
A) RAD
B) SDLC
C) OOP
D) SaaS

A

B) SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of firmware interface designed as a replacement for BIOS is called:

A) UEFI
B) GPT
C) ACPI
D) PXE

A

A) UEFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following answers refers to a network security solution providing a single point of protection against various types of threats?

A) IDP
B) AV
C) UTM
D) NGFW

A

C) UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A WAP is a specific type of AP that is used to create WLANs.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refers to a language used for creating and organizing the content of web pages?

A) HTML
B) CSS
C) JS
D) HTTP

A

A) HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network protocol enables retrieving contents of an Internet page from a web server?

A) SNMP
B) HTTP
C) SMTP
D) IMAP

A

B) HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

A) SFTP
B) HTTPS
C) FTPS
D) SHTTP

A

B) HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The purpose of PCI DSS is to provide protection for:

A) Credit cardholder data
B) Licensed software
C) User passwords
D) Personal health information

A

A) Credit cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which term describes the predicted loss of value to an asset based on a single security incident?

A) SLE
B) ARO
C) ALE
D) SLA

A

A) SLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following acronyms refers to a software that provides the functionality of a physical computer?

A) SDN
B) SaaS
C) VM
D) SoC

A

C) VM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the common term for a group of protocols used to carry voice data over a packet-switched network?

A) ISDN
B) PBX
C) VoIP
D) PSTN

A

C) VoIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the terms listed below refers to a formal contract between business partners outlining the rights, responsibilities, and obligations of each partner regarding the management, operation, and decision-making processes within the business?

A) MSA
B) SLA
C) BPA
D) MOA

A

C) BPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following file transfer protocols does not provide encryption?

A) SCP
B) FTPS
C) FTP
D) SFTP

A

C) FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for: (Select best answer)

A) PII
B) ESN
C) PHI
D) PIV

A

C) PHI

17
Q

Which of the answers listed below refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

A) PKI
B) RA
C) PKCS
D) CA

A

A) PKI

18
Q

Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A) PHI
B) PIV
C) PII
D) PKI

A

C) PII

19
Q

An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login on only one of the components is referred to as:

A) NAC
B) SSO
C) AAA
D) MFA

A

B) SSO

20
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

A) AES
B) DES
C) RC4
D) 3DES

A

A) AES

21
Q

Which of the following answers illustrates the difference between passive and active network security breach response?

A) HIPS vs. NIPS
B) UTM vs. Firewall
C) NIPS vs. UTM
D) IDS vs. IPS

A

D) IDS vs. IPS

22
Q

An SELinux kernel security feature for implementing stricter access controls and policies is known as:

A) DAC
B) RBAC
C) MAC
D) ABAC

A

C) MAC

23
Q

Which wireless security protocol has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

A) EAP
B) AES
C) WPA2
D) WEP

A

D) WEP

24
Q

Which access control model allows for defining granular rules that consider user roles, time constraints, and network access restrictions?

A) ABAC
B) MAC
C) RuBAC
D) DAC
E) RBAC

A

C) RuBAC

25
Q

Which type of control access model connects user permissions to their specific responsibilities?

A) DAC
B) RBAC
C) MAC
D) ABAC

A

B) RBAC

26
Q

The term “CIA triad” is used to describe the basic principles of information security.

A) True
B) False

A

A) True

27
Q

A type of document stipulating rules of behavior to be followed by users of computers, networks, and associated resources is called:

A) SLA
B) EULA
C) AUP
D) BPA

A

C) AUP

28
Q

LDAP is an example of:

A) Data encryption protocol
B) Address resolution protocol
C) Directory access protocol
D) File exchange protocol

A

C) Directory access protocol

29
Q

Which of the answers listed below refers to a suite of protocols used for connecting hosts on the Internet?

A) NetBIOS
B) IPv4
C) TCP/IP
D) IPv6

A

C) TCP/IP

30
Q

The SMTP protocol is used for: (Select 2 answers)

A) Sending email messages between mail servers

B) Name resolution services

C) Serving of web pages

D) Retrieving email messages from mail servers

E) Sending email messages from a client device

A

E) Sending email messages from a client device

A) Sending email messages between mail servers

31
Q

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

A) HSM
B) TPM
C) EFS
D) SED

A

D) SED

32
Q

A documented plan outlining the steps that should be taken in each phase of a cybersecurity incident is referred to as:

A) DRP
B) BCP
C) IRP
D) ERP

A

C) IRP

33
Q

Which of the terms listed below refers to a company that provides Internet access?

A) ISP
B) CSP
C) IdP
D) MSP

A

A) ISP

34
Q

As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.

A) True
B) False

A

A) True

35
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:

A) RDP
B) SSH
C) Telnet
D) SCP

A

B) SSH