CompTIA Security+ Quiz 10 Flashcards
A detailed agreement between a client and a vendor describing the work to be performed on a project is referred to as:
A) MSA
B) SLA
C) WO
D) SOW
D) SOW
Which of the following answers refers to an analog telephone service providing basic voice communication over copper telephone lines?
A) PSTN
B) ISDN
C) PBX
D) POTS
D) POTS
A protocol designed to improve the security of existing WEP implementations is known as:
A) SRTP
B) TKIP
C) CCMP
D) WPA2
B) TKIP
Which of the acronyms listed below refers to a technology used in cameras and surveillance systems that enables remote control of camera functions?
A) RDP
B) CCTV
C) PTZ
D) TCP/IP
C) PTZ
A security solution designed to detect anomalies in the log and event data collected from multiple network devices is called:
A) SNMP
B) PCAP
C) HIPS
D) SIEM
D) SIEM
Which of the following provides granular control over user access to specific network segments and resources based on their assigned roles and permissions?
A) IAM
B) SSO
C) PAM
D) MFA
A) IAM
Which of the answers listed below refers to a smart card used in mobile phones to identify the phone user?
A) IMSI
B) SoC
C) IMEI
D) SIM
D) SIM
Which of the following devices would be used for connecting a router to a T1 line?
A) CSU
B) IDF
C) NIC
D) EDR
A) CSU
What are the applications of PGP? (Select 3 answers)
A) Compressing data
B) Encrypting and decrypting data
C) Signing and verifying digital signatures
D) Managing public and private keys
E)Securing website traffic
B) Encrypting and decrypting data
C) Signing and verifying digital signatures
D) Managing public and private keys
A field in an SSL/TLS certificate that allows the certificate to be used for multiple domain names or IP addresses is referred to as:
A) CNAME
B) SAN
C) MX
D) PTR
B) SAN
Which of the answers listed below refers to a tunneling protocol commonly used in creating VPNs?
A) VRRP
B) GRE
C) RTSP
D) BGP
B) GRE
Which of the following answers refers to a professional that oversees the management and maintenance of an information repository?
A) CTO
B) PM
C) DBA
D) CIO
C) DBA
Which of the terms listed below refers to a US government initiative for real-time sharing of cyber threat indicators?
A) NVD
B) AIS
C) TTP
D) CVSS
B) AIS
A type of OS characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems, is known as:
A) UNIX
B) Windows NT
C) POSIX
D) RTOS
D) RTOS
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use?
A) CBC
B) GCM
C) ECB
D) CTR
C) ECB
Which communication method supports real-time text-based messaging, multimedia sharing, group chats, and video calls?
A) SMS
B) MMS
C) IM
D) RTC
C) IM
Which senior executive position assumes the responsibility for protecting assets, data, and people from potential threats?
A) CEO
B) CIO
C) CSO
D) CTO
C) CSO
A company or organization that offers cloud computing services over the Internet is called:
A) ISP
B) MSSP
C) CSP
D) MSP
C) CSP
Which cybersecurity role is primarily responsible for hands-on implementation and oversight of security measures for specific systems and networks?
A) CSO
B) CTO
C) DPO
D) ISSO
D) ISSO
Which of the terms listed below refers to a global community focused around the development of engineering standards?
A) ANSI
B) NIST
C) CERT
D) IEEE
D) IEEE
Which of the following answers refers to a device designed to supply (and monitor the quality of) electric power to multiple outlets?
A) PSU
B) MDF
C) PDU
D) IDF
C) PDU
Which of the answers listed below refers to a global standard development organization composed of different national standards bodies?
A) NIST
B) ISO
C) IEEE
D) ANSI
B) ISO
Which of the following acronyms refers to the process of identifying and preparing for potential disruptions or unexpected events to ensure business continuity?
A) BIA
B) SLE
C) CP
D) BPA
C) CP
A dedicated local network consisting of devices providing data access is referred to as:
A) SDN
B) NAS
C) iSCSI
D) SAN
D) SAN
Which of the answers listed below refers to a framework used on Unix-like OSs to manage authentication-related tasks?
A) PAM
B) SSO
C) MFA
D) OAuth
A) PAM
Which senior executive is responsible for managing an organization’s IT strategy and systems?
A) CEO
B) CIO
C) CSO
D) CTO
B) CIO
Which of the following answers refers to a network protocol for delivering audio and video over IP networks?
A) RDP
B) VoIP
C) RTP
D) UDP
C) RTP
Which of the terms listed below refers to a specialized suite of software tools used for developing applications for a specific platform?
A) GUI
B) SDLC
C) API
D) SDK
D) SDK
A type of software that serves as an intermediary between users and the hardware, allowing users to interact with the computer and run applications is known as:
A) ROM
B) BIOS
C) OS
D) RAM
C) OS
Which of the following answers refers to an encryption protocol primarily used in Wi-Fi networks implementing the WPA2 security standard?
A) TKIP
B) CCMP
C) SSL
D) HMAC
B) CCMP
In telecommunications, a type of main hub connecting internal networks with outside cabling is called:
A) MDF
B) ICS
C) MDI
D) IDF
A) MDF
Which of the acronyms listed below refers to a protocol used in network management systems for monitoring network-attached devices?
A) SSH
B) VNC
C) SNMP
D) RDP
C) SNMP
Which of the following answers refers to a routing protocol?
A) RTP
B) BGP
C) RDP
D) EAP
B) BGP
A specific URI type most commonly used to identify web pages is referred to as:
A) DOI
B) ISBN
C) OUI
D) URL
D) URL
Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?
A) PAC
B) DDNS
C) PAM
D) NAT
A) PAC
Which of the following terms refers to a network of physical devices, vehicles, buildings, and other items embedded with sensors, software, and other technologies that connect and exchange data with other devices and systems over the Internet?
A) SoC
B) PAN
C) IoT
D) WMN
C) IoT
Which of the answers listed below refers to a unique 32-bit identifier embedded in older mobile phones and used by network operators to identify and authenticate the device on the cellular network?
A) MAC
B) ESN
C) IP
D) OID
B) ESN
Which of the following answers refers to a software-based solution that allows users to access and interact with a virtual OS from anywhere using any device with an Internet connection?
A) VDU
B) VTC
C) VDE
D) VNC
C) VDE
Which of the acronyms listed below refers to a broader term used to describe an organization responsible for responding to computer-related emergencies?
A) CIRT
B) CERN
C) CERT
D) CSIRT
C) CERT
Which of the following acronyms refers to a discontinued research program focused on promoting innovation and development in the field of telecommunications and information technology?
A) IETF
B) CERN
C) DARPA
D) RACE
D) RACE
Which of the answers listed below refers to a team of experts within an organization focused on responding to a wide variety of computer-related incidents?
A) CERT
B) CSIRT
C) CIRT
D) CERN
C) CIRT
GPG is used for: (Select all that apply)
A) Securing website traffic
B) Managing public and private keys
C) Signing and verifying digital signatures
D) Compressing data
E) Encrypting and decrypting data
B) Managing public and private keys
C) Signing and verifying digital signatures
E) Encrypting and decrypting data
A software system that integrates and manages various business processes and functions across an organization is known as:
A) BCP
B) CMS
C) ERP
D) BIA
C) ERP
What is RIPEMD?
A) Block cipher encryption mode
B) Digital signature algorithm
C) Family of cryptographic hash functions
D) Symmetric encryption algorithm
C) Family of cryptographic hash functions
Which of the following acronyms refers to a dedicated facility responsible for monitoring, detecting, investigating, and responding to cybersecurity incidents?
A) NOC
B) C2
C) ISAC
D) SOC
D) SOC