CompTIA Security+ Quiz 2 Flashcards
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?
A) IPS
B) DLP
C) IDS
D) DEP
B) DLP
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
A) ACL
B) CSR
C) MAC
D) AUP
A) ACL
Which type of firmware performs initial hardware checks after the computer is powered on?
A) BIOS
B) POST
C) CMOS
D) PROM
A) BIOS
Which of the answers listed below refers to a software technology designed to simplify network infrastructure management?
A) SDN
B) QoS
C) VDI
D) CDN
A) SDN
Which of the following is an MS Windows component that enables encryption of individual files?
A) EFS
B) NTFS
C) DFS
D) NFS
A) EFS
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
A) WWAN
B) VPN
C) PAN
D) VLAN
B) VPN
Which of the answers listed below refers to a security standard introduced to address the vulnerabilities found in WEP?
A) TKIP
B) AES
C) WPA
D) CCMP
C) WPA
The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
A) True
B) False
A) True
POP3 is used for:
A) Name resolution
B) Sending email messages
C) File exchange
D) Email retrieval
D) Email retrieval
Which cloud service model would provide the best solution for a web developer intending to create a web app?
A) XaaS
B) SaaS
C) PaaS
D) IaaS
C) PaaS
Which of the following answers refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
A) MD5
B) SHA
C) CRC
D) HMAC
B) SHA
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
A) TLS
B) SSH
C) IPsec
D) VPN
C) IPsec
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
A) DNS
B) SNMP
C) NAT
D) DHCP
D) DHCP
Which of the following regulations protects the privacy and personal data of the EU citizens?
A) PHI
B) HIPAA
C) PCI DSS
D) GDPR
D) GDPR
Which of the answers listed below refers to a mechanical data storage medium type that relies on magnetic plates and moving parts for data storage and retrieval?
A) RAM
B) HDD
C) NVMe
D) SSD
B) HDD