CompTIA Security+ Quiz 4 Flashcards

1
Q

Which of the answers listed below refers to a concept that provides insights into methods and tools that cybercriminals use to carry out attacks?

A) TTP
B) CVE
C) ATT&CK
D) CVSS

A

A) TTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following solutions provides active network security breach response on an individual computer system?

A) NIDS
B) HIDS
C) NIPS
D) HIPS

A

D) HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is referred to as:

A) UTM
B) NGFW
C) UEM
D) WAF

A

D) WAF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?

A) ARO
B) SLE
C) ALE
D) SLA

A

C) ALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A software technology designed to provide confidentiality for an entire data storage device is known as:

A) TPM
B) FDE
C) EFS
D) HSM

A

B) FDE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

High MTBF value indicates that a component or system provides low reliability and is more likely to fail.

A) True
B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A) Accounting
B) Authentication
C) Auditing
D) Authorization

A

B) Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a routing protocol used in computer networks to determine the best path for routing data packets from one network node to another?

A) BGP
B) EIGRP
C) RIP
D) OSPF

A

D) OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to an industry standard for assessing and scoring the severity of computer system security vulnerabilities?

A) SIEM
B) CVSS
C) OSINT
D) SOAR

A

B) CVSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refers to a hardware or software solution providing secure remote access to networks and resources?

A) NAC
B) RDP
C) SSH
D) RAS

A

D) RAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

A) WPS
B) WAP
C) WPA2
D) WAF
E) WEP

A

A) WPS

E) WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refer(s) to SSDs? (Select all that apply)

A) Low performance

B) Relatively high device cost

C) Lower capacity in comparison to magnetic drives

D) High performance

E) Relatively low device cost

F) Higher capacity in comparison to magnetic drives

G) Lack of moving parts (takes advantage of memory chips instead of magnetic platters

A

B) Relatively high device cost

C) Lower capacity in comparison to magnetic drives

D) High performance

G) Lack of moving parts (takes advantage of memory chips instead of magnetic platters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An SWG is a software component, or a hardware device designed to prevent unauthorized traffic from entering an internal network of an organization. An SWG implementation may include various security services, such as packet filtering, URL/content filtering, malware inspection, application controls, AUP enforcement, or DLP.

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:

A) CVE
B) IoC
C) AIS
D) OSINT

A

B) IoC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the answers listed below refers to a remote access authentication protocol that periodically re-authenticates client at random intervals to prevent session hijacking?

A) EAP
B) CHAP
C) PAP
D) PEAP

A

B) CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A type of surveillance system comprising video cameras and monitors that enable continuous monitoring and recording of specific areas is commonly referred to as CCTV.

A) True
B) False

A

A) True

16
Q

Which of the following answers refers to an ECC-based method for creating and verifying digital signatures?

A) DHE
B) ECDSA
C) HMAC
D) ECDHE

A

B) ECDSA

17
Q

Which of the actions listed below can be taken by an IDS? (Select 2 answers)

A) Firewall reconfiguration
B) Closing down connection
C) Logging
D) Terminating process
E) Sending an alert

A

C) Logging

E) Sending an alert

18
Q

FTPS is an extension to the SSH protocol and runs by default on port number 22.

A) True
B) False

A

B) False

19
Q

Which of the following terms refers to a dedicated transport mechanism for cyber threat information?

A) STIX
B) CVE
C) TAXII
D) CVSS

A

C) TAXII

20
Q

Which of the answers listed below refers to a legacy symmetric-key block cipher encryption algorithm?

A) RC4
B) DES
C) RSA
D) DSA

A

B) DES

21
Q

A Microsoft-proprietary protocol providing a user with graphical interface for connecting to another networked host is known as:

A) VDI
B) RDP
C) SSH
D) VNC

A

B) RDP

22
Q

Which of the following acronyms refers to a comprehensive strategy and set of procedures designed to ensure that an organization can continue its critical operations and functions during and after a disruptive event?

A) DRP
B) CP
C) BCP
D) COOP

A

C) BCP

23
Q

Which type of Trojan enables unauthorized remote access to a compromised system?

A) APT
B) RAT
C) MaaS
D) PUP

A

B) RAT

24
Q

The term “AI” refers to computer systems and algorithms that can perform tasks typically requiring human intelligence, such as problem-solving, learning, and decision-making.

A) True
B) False

A

A) True

25
Q

Which of the algorithms listed below does not fall into the category of asymmetric encryption?

A) RSA
B) GPG
C) DSA
D) AES
E) DHE
F) ECDHE
G) PGP

A

D) AES

26
Q

A type of cyberattack focused on making a website, service, or network unavailable to users by overloading it with traffic or malicious requests is called:

A) SQLi
B) XSS
C) CSRF
D) DoS

A

D) DoS

27
Q

In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.

A) ALE
B) SLA
C) ARO
D) SLE

A

C) ARO

28
Q

Which of the following answers refers to a cryptographic file generated by an entity requesting a digital certificate from a CA?

A) OID
B) CSR
C) DN
D) CRL

A

B) CSR

29
Q

Which of the answers listed below refers to a broad term that encompasses various control and automation systems used in industrial settings to control and monitor physical processes and machinery?

A) ICS
B) PLC
C) SCADA
D) HMI

A

A) ICS

30
Q

ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.

A) True
B) False

A

A) True

31
Q

A type of access control model that grants object owners the authority to determine access permissions is referred to as:

A) ACL
B) RBAC
C) DAC
D) MAC

A

C) DAC

32
Q

Which wireless technology enables identification and tracking of tags attached to objects?

A) WTLS
B) GPS
C) RFID
D) NFC

A

C) RFID

33
Q

Which of the following answers refers to a tunneling protocol that is often used in combination with IPsec to secure VPN connections?

A) GRE
B) L2TP
C) BGP
D) SSL

A

B) L2TP

34
Q

Which of the answers listed below refers to a cloud computing service model in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

A) SaaS
B) DaaS
C) PaaS
D) IaaS

A

D) IaaS