CompTIA Security+ Quiz 2 Flashcards

1
Q

Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?

A) IPS
B) DLP
C) IDS
D) DEP

A

B) DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:

A) ACL
B) CSR
C) MAC
D) AUP

A

A) ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of firmware performs initial hardware checks after the computer is powered on?

A) BIOS
B) POST
C) CMOS
D) PROM

A

A) BIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to a software technology designed to simplify network infrastructure management?

A) SDN
B) QoS
C) VDI
D) CDN

A

A) SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is an MS Windows component that enables encryption of individual files?

A) EFS
B) NTFS
C) DFS
D) NFS

A

A) EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

A) WWAN
B) VPN
C) PAN
D) VLAN

A

B) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the answers listed below refers to a security standard introduced to address the vulnerabilities found in WEP?

A) TKIP
B) AES
C) WPA
D) CCMP

A

C) WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

POP3 is used for:

A) Name resolution
B) Sending email messages
C) File exchange
D) Email retrieval

A

D) Email retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which cloud service model would provide the best solution for a web developer intending to create a web app?

A) XaaS
B) SaaS
C) PaaS
D) IaaS

A

C) PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?

A) MD5
B) SHA
C) CRC
D) HMAC

A

B) SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?

A) TLS
B) SSH
C) IPsec
D) VPN

A

C) IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is called:

A) DNS
B) SNMP
C) NAT
D) DHCP

A

D) DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following regulations protects the privacy and personal data of the EU citizens?

A) PHI
B) HIPAA
C) PCI DSS
D) GDPR

A

D) GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a mechanical data storage medium type that relies on magnetic plates and moving parts for data storage and retrieval?

A) RAM
B) HDD
C) NVMe
D) SSD

A

B) HDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following terms refers to an environmental control system?

A) SCADA
B) HIPS
C) TEMPEST
D) HVAC

A

D) HVAC

17
Q

A type of network connecting computers within a small geographical area such as a building or group of buildings is referred to as:

A) PAN
B) LAN
C) MAN
D) WAN

A

B) LAN

18
Q

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

A) QoS
B) DHCP
C) NAT
D) DNS

A

C) NAT

19
Q

Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?

A) PSK
B) 802.1X
C) SAE
D) TKIP

A

A) PSK

20
Q

Copies of lost private encryption keys can be retrieved from a key escrow by RAs (i.e., individuals with access to key database and permission level allowing them to extract keys from escrow).

A) True
B) False

A

A) True

21
Q

Which type of unsolicited messaging relies on text-based communication?

A) VAM
B) SPIM
C) JMS
D) SPIT

A

B) SPIM

22
Q

Which of the answers listed below refers to a secure replacement for Telnet?

A) CHAP
B) FTP
C) SNMP
D) SSH

A

D) SSH

23
Q

Which of the following answers refers to a family of cryptographic hash functions used in a variety of security applications, including digital signatures, password storage, secure communications, and data integrity verification?

A) RSA
B) IDEA
C) AES
D) SHA

A

D) SHA

24
Q

In the AAA security architecture, the process of granting or denying access to resources is known as:

A) Auditing
B) Authentication
C) Authorization
D) Accounting

A

Authorization

25
Q

Which of the terms listed below applies to the authentication process?

A) MFA
B) MMC
C) MDM
D) MFD

A

A) MFA

26
Q

Which of the following answers refer to NIPS? (Select 3 answers)

A) Takes proactive measures to block or mitigate intrusion attempts

B) Generates alerts and notifies security personnel or administrators when suspicious activity is detected

C) Operates in an inline mode, actively intercepting and inspecting network traffic

D) Monitors network traffic without direct involvement in traffic routing or packet modification

E) Does not take direct action to block or prevent attacks

F) It can drop or reject network packets, terminate connections, or take other actions to stop the attack

A

A) Takes proactive measures to block or mitigate intrusion attempts

C) Operates in an inline mode, actively intercepting and inspecting network traffic

F) It can drop or reject network packets, terminate connections, or take other actions to stop the attack

27
Q

Which of the terms listed below refers to threat intelligence gathered from publicly available sources?

A) IoC
B) OSINT
C) RFC
D) CVE/NVD

A

B) OSINT

28
Q

Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?

A) IDE
B) PCIe
C) USB
D) eSATA

A

C) USB

29
Q

Which of the solutions listed below allows to check whether a digital certificate has been revoked?

A) OCR
B) CRL
C) CSR
D) OSPF

A

B) CRL

30
Q

A type of computer security solution that allows to define and enforce network access policies is called:

A) NAT
B) ACL
C) NAC
D) DLP

A

C) NAC

31
Q

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

A) DNS
B) APIPA
C) NAT
D) DHCP

A

C) NAT

32
Q

Which of the answers listed below refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?

A) CTO
B) DPO
C) CIO
D) CSO

A

B) DPO

33
Q

Which of the following terms refers to an agreement that specifies performance requirements for a vendor?

A) MSA
B) SLA
C) MOU
D) SOW

A

B) SLA

34
Q

A legal contract between the holder of confidential information and another person to whom that information is disclosed restricting that other person from disclosing the confidential information to any other party is referred to as:

A) ISA
B) NDA
C) BPA
D) SLA

A

B) NDA

35
Q

Which of the answers listed below refers to a protocol designed to secure data transmitted over WLANs?

A) SCP
B) IPsec
C) SSH
D) WTLS

A

D) WTLS