CompTIA Security+ Quiz 4 Flashcards
Which of the answers listed below refers to a concept that provides insights into methods and tools that cybercriminals use to carry out attacks?
A) TTP
B) CVE
C) ATT&CK
D) CVSS
A) TTP
Which of the following solutions provides active network security breach response on an individual computer system?
A) NIDS
B) HIDS
C) NIPS
D) HIPS
D) HIPS
A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is referred to as:
A) UTM
B) NGFW
C) UEM
D) WAF
D) WAF
Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to a risk over a one-year period?
A) ARO
B) SLE
C) ALE
D) SLA
C) ALE
A software technology designed to provide confidentiality for an entire data storage device is known as:
A) TPM
B) FDE
C) EFS
D) HSM
B) FDE
High MTBF value indicates that a component or system provides low reliability and is more likely to fail.
A) True
B) False
B) False
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
A) Accounting
B) Authentication
C) Auditing
D) Authorization
B) Authentication
Which of the following answers refers to a routing protocol used in computer networks to determine the best path for routing data packets from one network node to another?
A) BGP
B) EIGRP
C) RIP
D) OSPF
D) OSPF
Which of the answers listed below refers to an industry standard for assessing and scoring the severity of computer system security vulnerabilities?
A) SIEM
B) CVSS
C) OSINT
D) SOAR
B) CVSS
Which of the following answers refers to a hardware or software solution providing secure remote access to networks and resources?
A) NAC
B) RDP
C) SSH
D) RAS
D) RAS
Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)
A) WPS
B) WAP
C) WPA2
D) WAF
E) WEP
A) WPS
E) WEP
Which of the following answers refer(s) to SSDs? (Select all that apply)
A) Low performance
B) Relatively high device cost
C) Lower capacity in comparison to magnetic drives
D) High performance
E) Relatively low device cost
F) Higher capacity in comparison to magnetic drives
G) Lack of moving parts (takes advantage of memory chips instead of magnetic platters
B) Relatively high device cost
C) Lower capacity in comparison to magnetic drives
D) High performance
G) Lack of moving parts (takes advantage of memory chips instead of magnetic platters
An SWG is a software component, or a hardware device designed to prevent unauthorized traffic from entering an internal network of an organization. An SWG implementation may include various security services, such as packet filtering, URL/content filtering, malware inspection, application controls, AUP enforcement, or DLP.
A) True
B) False
A) True
A type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities is called:
A) CVE
B) IoC
C) AIS
D) OSINT
B) IoC
Which of the answers listed below refers to a remote access authentication protocol that periodically re-authenticates client at random intervals to prevent session hijacking?
A) EAP
B) CHAP
C) PAP
D) PEAP
B) CHAP