CompTIA Security+ Quiz 1 Flashcards
A type of user identification mechanism used as a countermeasure against automated software (such as network bots) is known as:
A) MFA
B) CAPTCHA
C) ACL
D) NIPS
B) CAPTCHA
Which of the following is the recommended replacement for DES?
A) DSA
B) RSA
C) RC4
D) AES
D) AES
Which of the terms listed below refers to the process of creating and maintaining computer applications?
A) RAD
B) SDLC
C) OOP
D) SaaS
B) SDLC
A type of firmware interface designed as a replacement for BIOS is called:
A) UEFI
B) GPT
C) ACPI
D) PXE
A) UEFI
Which of the following answers refers to a network security solution providing a single point of protection against various types of threats?
A) IDP
B) AV
C) UTM
D) NGFW
C) UTM
A WAP is a specific type of AP that is used to create WLANs.
A) True
B) False
A) True
Which of the answers listed below refers to a language used for creating and organizing the content of web pages?
A) HTML
B) CSS
C) JS
D) HTTP
A) HTML
Which network protocol enables retrieving contents of an Internet page from a web server?
A) SNMP
B) HTTP
C) SMTP
D) IMAP
B) HTTP
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
A) SFTP
B) HTTPS
C) FTPS
D) SHTTP
B) HTTPS
The purpose of PCI DSS is to provide protection for:
A) Credit cardholder data
B) Licensed software
C) User passwords
D) Personal health information
A) Credit cardholder data
Which term describes the predicted loss of value to an asset based on a single security incident?
A) SLE
B) ARO
C) ALE
D) SLA
A) SLE
Which of the following acronyms refers to a software that provides the functionality of a physical computer?
A) SDN
B) SaaS
C) VM
D) SoC
C) VM
What is the common term for a group of protocols used to carry voice data over a packet-switched network?
A) ISDN
B) PBX
C) VoIP
D) PSTN
C) VoIP
Which of the terms listed below refers to a formal contract between business partners outlining the rights, responsibilities, and obligations of each partner regarding the management, operation, and decision-making processes within the business?
A) MSA
B) SLA
C) BPA
D) MOA
C) BPA
Which of the following file transfer protocols does not provide encryption?
A) SCP
B) FTPS
C) FTP
D) SFTP
C) FTP