CompTIA Security+ Quiz 10 Flashcards

1
Q

A detailed agreement between a client and a vendor describing the work to be performed on a project is referred to as:

A) MSA
B) SLA
C) WO
D) SOW

A

D) SOW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to an analog telephone service providing basic voice communication over copper telephone lines?

A) PSTN
B) ISDN
C) PBX
D) POTS

A

D) POTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A protocol designed to improve the security of existing WEP implementations is known as:

A) SRTP
B) TKIP
C) CCMP
D) WPA2

A

B) TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the acronyms listed below refers to a technology used in cameras and surveillance systems that enables remote control of camera functions?

A) RDP
B) CCTV
C) PTZ
D) TCP/IP

A

C) PTZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security solution designed to detect anomalies in the log and event data collected from multiple network devices is called:

A) SNMP
B) PCAP
C) HIPS
D) SIEM

A

D) SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following provides granular control over user access to specific network segments and resources based on their assigned roles and permissions?

A) IAM
B) SSO
C) PAM
D) MFA

A

A) IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a smart card used in mobile phones to identify the phone user?

A) IMSI
B) SoC
C) IMEI
D) SIM

A

D) SIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices would be used for connecting a router to a T1 line?

A) CSU
B) IDF
C) NIC
D) EDR

A

A) CSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the applications of PGP? (Select 3 answers)

A) Compressing data

B) Encrypting and decrypting data

C) Signing and verifying digital signatures

D) Managing public and private keys

E)Securing website traffic

A

B) Encrypting and decrypting data

C) Signing and verifying digital signatures

D) Managing public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A field in an SSL/TLS certificate that allows the certificate to be used for multiple domain names or IP addresses is referred to as:

A) CNAME
B) SAN
C) MX
D) PTR

A

B) SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refers to a tunneling protocol commonly used in creating VPNs?

A) VRRP
B) GRE
C) RTSP
D) BGP

A

B) GRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a professional that oversees the management and maintenance of an information repository?

A) CTO
B) PM
C) DBA
D) CIO

A

C) DBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the terms listed below refers to a US government initiative for real-time sharing of cyber threat indicators?

A) NVD
B) AIS
C) TTP
D) CVSS

A

B) AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems, is known as:

A) UNIX
B) Windows NT
C) POSIX
D) RTOS

A

D) RTOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?

A) CBC
B) GCM
C) ECB
D) CTR

A

C) ECB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which communication method supports real-time text-based messaging, multimedia sharing, group chats, and video calls?

A) SMS
B) MMS
C) IM
D) RTC

A

C) IM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which senior executive position assumes the responsibility for protecting assets, data, and people from potential threats?

A) CEO
B) CIO
C) CSO
D) CTO

A

C) CSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A company or organization that offers cloud computing services over the Internet is called:

A) ISP
B) MSSP
C) CSP
D) MSP

A

C) CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which cybersecurity role is primarily responsible for hands-on implementation and oversight of security measures for specific systems and networks?

A) CSO
B) CTO
C) DPO
D) ISSO

A

D) ISSO

18
Q

Which of the terms listed below refers to a global community focused around the development of engineering standards?

A) ANSI
B) NIST
C) CERT
D) IEEE

A

D) IEEE

19
Q

Which of the following answers refers to a device designed to supply (and monitor the quality of) electric power to multiple outlets?

A) PSU
B) MDF
C) PDU
D) IDF

A

C) PDU

20
Q

Which of the answers listed below refers to a global standard development organization composed of different national standards bodies?

A) NIST
B) ISO
C) IEEE
D) ANSI

A

B) ISO

21
Q

Which of the following acronyms refers to the process of identifying and preparing for potential disruptions or unexpected events to ensure business continuity?

A) BIA
B) SLE
C) CP
D) BPA

A

C) CP

22
Q

A dedicated local network consisting of devices providing data access is referred to as:

A) SDN
B) NAS
C) iSCSI
D) SAN

A

D) SAN

23
Q

Which of the answers listed below refers to a framework used on Unix-like OSs to manage authentication-related tasks?

A) PAM
B) SSO
C) MFA
D) OAuth

A

A) PAM

23
Q

Which senior executive is responsible for managing an organization’s IT strategy and systems?

A) CEO
B) CIO
C) CSO
D) CTO

A

B) CIO

24
Q

Which of the following answers refers to a network protocol for delivering audio and video over IP networks?

A) RDP
B) VoIP
C) RTP
D) UDP

A

C) RTP

25
Q

Which of the terms listed below refers to a specialized suite of software tools used for developing applications for a specific platform?

A) GUI
B) SDLC
C) API
D) SDK

A

D) SDK

26
Q

A type of software that serves as an intermediary between users and the hardware, allowing users to interact with the computer and run applications is known as:

A) ROM
B) BIOS
C) OS
D) RAM

A

C) OS

27
Q

Which of the following answers refers to an encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard?

A) TKIP
B) CCMP
C) SSL
D) HMAC

A

B) CCMP

28
Q

In telecommunications, a type of main hub connecting internal networks with outside cabling is called:

A) MDF
B) ICS
C) MDI
D) IDF

A

A) MDF

29
Q

Which of the acronyms listed below refers to a protocol used in network management systems for monitoring network-attached devices?

A) SSH
B) VNC
C) SNMP
D) RDP

A

C) SNMP

30
Q

Which of the following answers refers to a routing protocol?

A) RTP
B) BGP
C) RDP
D) EAP

A

B) BGP

31
Q

A specific URI type most commonly used to identify web pages is referred to as:

A) DOI
B) ISBN
C) OUI
D) URL

A

D) URL

32
Q

Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?

A) PAC
B) DDNS
C) PAM
D) NAT

A

A) PAC

33
Q

Which of the following terms refers to a network of physical devices, vehicles, buildings, and other items embedded with sensors, software, and other technologies that connect and exchange data with other devices and systems over the Internet?

A) SoC
B) PAN
C) IoT
D) WMN

A

C) IoT

34
Q

Which of the answers listed below refers to a unique 32-bit identifier embedded in older mobile phones and used by network operators to identify and authenticate the device on the cellular network?

A) MAC
B) ESN
C) IP
D) OID

A

B) ESN

35
Q

Which of the following answers refers to a software-based solution that allows users to access and interact with a virtual OS from anywhere using any device with an Internet connection?

A) VDU
B) VTC
C) VDE
D) VNC

A

C) VDE

36
Q

Which of the acronyms listed below refers to a broader term used to describe an organization responsible for responding to computer-related emergencies?

A) CIRT
B) CERN
C) CERT
D) CSIRT

A

C) CERT

37
Q

Which of the following acronyms refers to a discontinued research program focused on promoting innovation and development in the field of telecommunications and information technology?

A) IETF
B) CERN
C) DARPA
D) RACE

A

D) RACE

38
Q

Which of the answers listed below refers to a team of experts within an organization focused on responding to a wide variety of computer-related incidents?

A) CERT
B) CSIRT
C) CIRT
D) CERN

A

C) CIRT

39
Q

GPG is used for: (Select all that apply)

A) Securing website traffic

B) Managing public and private keys

C) Signing and verifying digital signatures

D) Compressing data

E) Encrypting and decrypting data

A

B) Managing public and private keys

C) Signing and verifying digital signatures

E) Encrypting and decrypting data

40
Q

A software system that integrates and manages various business processes and functions across an organization is known as:

A) BCP
B) CMS
C) ERP
D) BIA

A

C) ERP

41
Q

What is RIPEMD?

A) Block cipher encryption mode

B) Digital signature algorithm

C) Family of cryptographic hash functions

D) Symmetric encryption algorithm

A

C) Family of cryptographic hash functions

42
Q

Which of the following acronyms refers to a dedicated facility responsible for monitoring, detecting, investigating, and responding to cybersecurity incidents?

A) NOC
B) C2
C) ISAC
D) SOC

A

D) SOC