CompTIA Security+ Quiz 3 Flashcards

1
Q

A less formal document outlining mutual goals and cooperation established between two or more parties is referred to as:

A) MOA
B) SOW
C) MOU
D) MSA

A

C) MOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to a global standard development organization composed of different national standards bodies?

A) NIST
B) ISO
C) IEEE
D) ANSI

A

B) ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term “SD-WAN” refers to a network technology that uses software to manage and optimize network connections that extend over large geographic areas.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to a dedicated programming language used in database management?

A) PHP
B) C
C) SQL
D) JS

A

C) SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following devices fall(s) into the category of PEDs? (Select all that apply)

A) Smartphone
B) Tablet
C) Desktop
D) Mainframe

A

A) Smartphone
B) Tablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the terms listed below is used to describe an average time required to repair a failed component or device?

A) MTTF
B) RPO
C) MTTR
D) MTBF

A

C) MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?

A) IDS
B) Packet filter
C) NGFW
D) Stateful firewall

A

C) NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol enables secure, real-time delivery of audio and video over an IP network?

A) S/MIME
B) RTP
C) SIP
D) SRTP

A

D) SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?

A) WIPS
B) NIDS
C) NIPS
D) WIDS

A

A) WIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refers to a method for creating and verifying digital signatures?

A) DHE
B) AES
C) DSA
D) SHA

A

C) DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of legally binding contract that establishes the foundational terms and conditions governing future agreements between two parties is known as:

A) MOU
B) SLA
C) MSA
D) SOW

A

C) MSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which part of IPsec provides authentication, integrity, and confidentiality?

A) SPD
B) PFS
C) AH
D) ESP

A

D) ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refers to a multi-protocol authentication framework frequently used in 802.11 networks and point-to-point connections?

A) PAP
B) MS-CHAP
C) EAP
D) CHAP

A

C) EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following acronyms represents evidence that helps cybersecurity professionals detect potential security incidents?

A) APT
B) IoC
C) ATT&CK
D) EDR

A

B) IoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a WAP.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to an obsolete authentication protocol that sends passwords in cleartext?

A) PAP
B) CHAP
C) EAP
D) MS-CHAP

A

A) PAP

16
Q

Which of the following answers refers to an internal telephone exchange or switching system implemented in a business or office?

A) POTS
B) VoIP
C) PBX
D) PSTN

A

C) PBX

17
Q

Which of the acronyms listed below refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?

A) SLA
B) RTO
C) AUP
D) RPO

A

B) RTO

18
Q

A computer network connecting multiple LANs over an area of a city is called:

A) PAN
B) SAN
C) MAN
D) CAN

A

C) MAN

19
Q

Which cryptographic protocol is designed to provide secure communications over a computer network and is the successor to SSL?

A) WEP
B) CCMP
C) TLS
D) AES

A

C) TLS

20
Q

Which of the following answers refers to an embedded microcontroller used for secure boot, disk encryption, and system integrity verification?

A) TPM
B) SoC
C) UEFI
D) HSM

A

A) TPM

21
Q

Which of the answers listed below refer to IMAP? (Select 2 answers)

A) Offers improved functionality in comparison to POP3

B) Serves the same function as POP3

C) Enables sending email messages from client devices

D) Offers less functions than POP3

E) Enables email exchange between mail servers

A

A) Offers improved functionality in comparison to POP3

B) Serves the same function as POP3

22
Q

Which cryptographic solution would be best suited for low-power devices, such as IoT devices, embedded systems, and mobile devices?

A) ECC
B) DES
C) RSA
D) AES

A

A) ECC

23
Q

The term “ASLR” refers to a technique used in modern OSs to enhance:

A) Data redundancy
B) System security
C) Performance
D) Storage capacity

A

B) System security

24
Q

Which of the following solutions provide the AAA functionality? (Select 2 answers)

A) CHAP
B) TACACS+
C) PAP
D) RADIUS
E) MS-CHAP

A

B) TACACS+

D) RADIUS

24
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A) CRL
B) NAT
C) BCP
D) ACL

A

D) ACL

25
Q

A network admin can ping remote host by its IP address, but not by its domain name. Which of the following is the most probable source of this problem?

A) ICMP
B) DNS
C) HTTP
D) DHCP

A

B) DNS

26
Q

The role of a RA in PKI is to: (Select 2 answers)

A) Accept requests for digital certificates

B) Validate digital certificates

C) Authenticate the entity making the request

D)Provide backup source for cryptographic keys

E) Issue digital certificates

A

A) Accept requests for digital certificates

C) Authenticate the entity making the request

27
Q

Which of the answers listed below refers to a generic term used to identify any resource?

A) OUI
B) URI
C) OID
D) URL

A

B) URI

28
Q

Which of the following answers refers to a framework widely used for enabling secure third-party access to user accounts?

A) SSO
B) OAuth
C) MFA
D) SAML

A

B) OAuth

29
Q

An IV is a random or pseudorandom value used in cryptography to ensure that the same plaintext input does not produce the same ciphertext output, even when the same encryption key is used. The IV is typically used with encryption algorithms in block cipher modes to enhance security by introducing randomness to the encryption process.

A) True
B) False

A

A) True

30
Q

Which of the answers listed below refers to a security vulnerability that allows an attacker to inject malicious code into input fields, such as search bars or login forms, to execute unauthorized commands on a database?

A) RCE
B) SQLi
C) XSS
D) CSRF

A

B) SQLi

31
Q

What is the name of a mobile device deployment model in which employees select devices for work-related tasks from a company-approved device list?

A) VDI
B) CYOD
C) BYOD
D) COPE

A

B) CYOD

32
Q

Which of the following terms is used to describe sophisticated and prolonged cyberattacks often carried out by well-funded and organized groups, such as nation-states?

A) MitM
B) APT
C) XSRF
D) DDoS

A

B) APT

33
Q

What is STIX?

A) Vulnerability database

B) Common language for describing cyber threat information

C) US government initiative for real-time sharing of cyber threat indicators

D) Transport mechanism for cyber threat information

A

B) Common language for describing cyber threat information