CompTIA Security+ Quiz 3 Flashcards
A less formal document outlining mutual goals and cooperation established between two or more parties is referred to as:
A) MOA
B) SOW
C) MOU
D) MSA
C) MOU
Which of the following answers refers to a global standard development organization composed of different national standards bodies?
A) NIST
B) ISO
C) IEEE
D) ANSI
B) ISO
The term “SD-WAN” refers to a network technology that uses software to manage and optimize network connections that extend over large geographic areas.
A) True
B) False
A) True
Which of the answers listed below refers to a dedicated programming language used in database management?
A) PHP
B) C
C) SQL
D) JS
C) SQL
Which of the following devices fall(s) into the category of PEDs? (Select all that apply)
A) Smartphone
B) Tablet
C) Desktop
D) Mainframe
A) Smartphone
B) Tablet
Which of the terms listed below is used to describe an average time required to repair a failed component or device?
A) MTTF
B) RPO
C) MTTR
D) MTBF
C) MTTR
Which of the following answers refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?
A) IDS
B) Packet filter
C) NGFW
D) Stateful firewall
C) NGFW
Which protocol enables secure, real-time delivery of audio and video over an IP network?
A) S/MIME
B) RTP
C) SIP
D) SRTP
D) SRTP
Which of the answers listed below refers to a network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?
A) WIPS
B) NIDS
C) NIPS
D) WIDS
A) WIPS
Which of the following answers refers to a method for creating and verifying digital signatures?
A) DHE
B) AES
C) DSA
D) SHA
C) DSA
A type of legally binding contract that establishes the foundational terms and conditions governing future agreements between two parties is known as:
A) MOU
B) SLA
C) MSA
D) SOW
C) MSA
Which part of IPsec provides authentication, integrity, and confidentiality?
A) SPD
B) PFS
C) AH
D) ESP
D) ESP
Which of the answers listed below refers to a multi-protocol authentication framework frequently used in 802.11 networks and point-to-point connections?
A) PAP
B) MS-CHAP
C) EAP
D) CHAP
C) EAP
Which of the following acronyms represents evidence that helps cybersecurity professionals detect potential security incidents?
A) APT
B) IoC
C) ATT&CK
D) EDR
B) IoC
For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.
A) True
B) False
A) True
Which of the answers listed below refers to an obsolete authentication protocol that sends passwords in cleartext?
A) PAP
B) CHAP
C) EAP
D) MS-CHAP
A) PAP
Which of the following answers refers to an internal telephone exchange or switching system implemented in a business or office?
A) POTS
B) VoIP
C) PBX
D) PSTN
C) PBX
Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?
A) SLA
B) RTO
C) AUP
D) RPO
B) RTO
A computer network connecting multiple LANs over an area of a city is called:
A) PAN
B) SAN
C) MAN
D) CAN
C) MAN
Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?
A) WEP
B) CCMP
C) TLS
D) AES
C) TLS
Which of the following answers refers to an embedded microcontroller used for secure boot, disk encryption, and system integrity verification?
A) TPM
B) SoC
C) UEFI
D) HSM
A) TPM
Which of the answers listed below refer to IMAP? (Select 2 answers)
A) Offers improved functionality in comparison to POP3
B) Serves the same function as POP3
C) Enables sending email messages from client devices
D) Offers less functions than POP3
E) Enables email exchange between mail servers
A) Offers improved functionality in comparison to POP3
B) Serves the same function as POP3
Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?
A) ECC
B) DES
C) RSA
D) AES
A) ECC
The term “ASLR” refers to a technique used in modern OSs to enhance:
A) Data redundancy
B) System security
C) Performance
D) Storage capacity
B) System security
Which of the following solutions provide the AAA functionality? (Select 2 answers)
A) CHAP
B) TACACS+
C) PAP
D) RADIUS
E) MS-CHAP
B) TACACS+
D) RADIUS
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
A) CRL
B) NAT
C) BCP
D) ACL
D) ACL
A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?
A) ICMP
B) DNS
C) HTTP
D) DHCP
B) DNS
The role of a RA in PKI is to: (Select 2 answers)
A) Accept requests for digital certificates
B) Validate digital certificates
C) Authenticate the entity making the request
D)Provide backup source for cryptographic keys
E) Issue digital certificates
A) Accept requests for digital certificates
C) Authenticate the entity making the request
Which of the answers listed below refers to a generic term used to identify any resource?
A) OUI
B) URI
C) OID
D) URL
B) URI
Which of the following answers refers to a framework widely used for enabling secure third-party access to user accounts?
A) SSO
B) OAuth
C) MFA
D) SAML
B) OAuth
An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.
A) True
B) False
A) True
Which of the answers listed below refers to a security vulnerability that allows an attacker to inject malicious code into input fields, such as search bars or login forms, to execute unauthorized commands on a database?
A) RCE
B) SQLi
C) XSS
D) CSRF
B) SQLi
What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?
A) VDI
B) CYOD
C) BYOD
D) COPE
B) CYOD
Which of the following terms is used to describe sophisticated and prolonged cyberattacks often carried out by well-funded and organized groups, such as nation-states?
A) MitM
B) APT
C) XSRF
D) DDoS
B) APT
What is STIX?
A) Vulnerability database
B) Common language for describing cyber threat information
C) US government initiative for real-time sharing of cyber threat indicators
D) Transport mechanism for cyber threat information
B) Common language for describing cyber threat information