CompTIA Security+ Quiz 2 Flashcards
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?
A) IPS
B) DLP
C) IDS
D) DEP
B) DLP
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
A) ACL
B) CSR
C) MAC
D) AUP
A) ACL
Which type of firmware performs initial hardware checks after the computer is powered on?
A) BIOS
B) POST
C) CMOS
D) PROM
A) BIOS
Which of the answers listed below refers to a software technology designed to simplify network infrastructure management?
A) SDN
B) QoS
C) VDI
D) CDN
A) SDN
Which of the following is an MS Windows component that enables encryption of individual files?
A) EFS
B) NTFS
C) DFS
D) NFS
A) EFS
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
A) WWAN
B) VPN
C) PAN
D) VLAN
B) VPN
Which of the answers listed below refers to a security standard introduced to address the vulnerabilities found in WEP?
A) TKIP
B) AES
C) WPA
D) CCMP
C) WPA
The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
A) True
B) False
A) True
POP3 is used for:
A) Name resolution
B) Sending email messages
C) File exchange
D) Email retrieval
D) Email retrieval
Which cloud service model would provide the best solution for a web developer intending to create a web app?
A) XaaS
B) SaaS
C) PaaS
D) IaaS
C) PaaS
Which of the following answers refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
A) MD5
B) SHA
C) CRC
D) HMAC
B) SHA
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
A) TLS
B) SSH
C) IPsec
D) VPN
C) IPsec
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
A) DNS
B) SNMP
C) NAT
D) DHCP
D) DHCP
Which of the following regulations protects the privacy and personal data of the EU citizens?
A) PHI
B) HIPAA
C) PCI DSS
D) GDPR
D) GDPR
Which of the answers listed below refers to a mechanical data storage medium type that relies on magnetic plates and moving parts for data storage and retrieval?
A) RAM
B) HDD
C) NVMe
D) SSD
B) HDD
Which of the following terms refers to an environmental control system?
A) SCADA
B) HIPS
C) TEMPEST
D) HVAC
D) HVAC
A type of network connecting computers within a small geographical area such as a building or group of buildings is referred to as:
A) PAN
B) LAN
C) MAN
D) WAN
B) LAN
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
A) QoS
B) DHCP
C) NAT
D) DNS
C) NAT
Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?
A) PSK
B) 802.1X
C) SAE
D) TKIP
A) PSK
Copies of lost private encryption keys can be retrieved from a key escrow by RAs (i.e., individuals with access to key database and permission level allowing them to extract keys from escrow).
A) True
B) False
A) True
Which type of unsolicited messaging relies on text-based communication?
A) VAM
B) SPIM
C) JMS
D) SPIT
B) SPIM
Which of the answers listed below refers to a secure replacement for Telnet?
A) CHAP
B) FTP
C) SNMP
D) SSH
D) SSH
Which of the following answers refers to a family of cryptographic hash functions used in a variety of security applications, including digital signatures, password storage, secure communications, and data integrity verification?
A) RSA
B) IDEA
C) AES
D) SHA
D) SHA
In the AAA security architecture, the process of granting or denying access to resources is known as:
A) Auditing
B) Authentication
C) Authorization
D) Accounting
Authorization
Which of the terms listed below applies to the authentication process?
A) MFA
B) MMC
C) MDM
D) MFD
A) MFA
Which of the following answers refer to NIPS? (Select 3 answers)
A) Takes proactive measures to block or mitigate intrusion attempts
B) Generates alerts and notifies security personnel or administrators when suspicious activity is detected
C) Operates in an inline mode, actively intercepting and inspecting network traffic
D) Monitors network traffic without direct involvement in traffic routing or packet modification
E) Does not take direct action to block or prevent attacks
F) It can drop or reject network packets, terminate connections, or take other actions to stop the attack
A) Takes proactive measures to block or mitigate intrusion attempts
C) Operates in an inline mode, actively intercepting and inspecting network traffic
F) It can drop or reject network packets, terminate connections, or take other actions to stop the attack
Which of the terms listed below refers to threat intelligence gathered from publicly available sources?
A) IoC
B) OSINT
C) RFC
D) CVE/NVD
B) OSINT
Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?
A) IDE
B) PCIe
C) USB
D) eSATA
C) USB
Which of the solutions listed below allows to check whether a digital certificate has been revoked?
A) OCR
B) CRL
C) CSR
D) OSPF
B) CRL
A type of computer security solution that allows to define and enforce network access policies is called:
A) NAT
B) ACL
C) NAC
D) DLP
C) NAC
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
A) DNS
B) APIPA
C) NAT
D) DHCP
C) NAT
Which of the answers listed below refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?
A) CTO
B) DPO
C) CIO
D) CSO
B) DPO
Which of the following terms refers to an agreement that specifies performance requirements for a vendor?
A) MSA
B) SLA
C) MOU
D) SOW
B) SLA
A legal contract between the holder of confidential information and another person to whom that information is disclosed restricting that other person from disclosing the confidential information to any other party is referred to as:
A) ISA
B) NDA
C) BPA
D) SLA
B) NDA
Which of the answers listed below refers to a protocol designed to secure data transmitted over WLANs?
A) SCP
B) IPsec
C) SSH
D) WTLS
D) WTLS