CompTIA Security+ Quiz 5 Flashcards

1
Q

Which of the following answers refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A) SSL
B) IKE
C) ESP
D) DHE

A

B) IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An access control model that enforces the strictest set of access rules is known as:

A) MAC
B) RBAC
C) DAC
D) ABAC

A

A) MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the acronyms listed below refers to a cryptographic software tool for secure email communication and data protection?

A) DES
B) PEM
C) EFS
D) PGP

A

D) PGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of action allows an attacker to exploit the XSS vulnerability?

A) Code injection
B) Banner grabbing
C) PIN recovery
D) Input validation

A

A) Code injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of vulnerability where the state of a resource is verified at one point in time but may change before the resource is actually used is called:

A) TOC
B) TOC/TOU
C) TOU
D) TSIG

A

B) TOC/TOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term “SMS” is used in reference to:

A) Text messaging services
B) Enhanced messaging services
C) Multimedia messaging services
D) Rich communication services

A

A) Text messaging services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following terms refers to a framework and knowledge base that provides understanding of TTPs used during cyberattacks?

A) CVSS
B) ATT&CK
C) TAXII
D) STIX

A

B) ATT&CK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to a security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats at the device level?

A) SWG
B) CASB
C) EDR
D) NGFW

A

C) EDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

A) TCP/IP
B) DNS
C) SQL
D) DHCP

A

B) DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The term “OTA” refers to the process of wirelessly transmitting data, updates, or information to electronic devices, such as smartphones, tablets, or IoT devices, typically using cellular networks, Wi-Fi, or other wireless communication methods

A) True
B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the acronyms listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic and key management functions?

A) EFS
B) HSM
C) SFC
D) TPM

A

B) HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a PUP? (Select 3 answers)

A) A type of computer program not explicitly classified as malware by AV software

B) An application downloaded and installed without the user’s consent

C) A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads

D) An application downloaded and installed with the user’s consent

E) A type of computer program explicitly classified as malware by AV applications

F)A type of free, utility software often bundled with a paid app

A

A) A type of computer program not explicitly classified as malware by AV software

C) A type of software that may adversely affect the computer’s security and performance, compromise user’s privacy, or display unsolicited ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A measure of the likelihood that a biometric security system will incorrectly reject an access attempt by an authorized user is referred to as:

A) FAR
B) CER
C) CRC
D) FRR

A

D) FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following enables the automation of vulnerability scanning and compliance checking?

A) SAML
B) OVAL
C) SCAP
D) SASE

A

C) SCAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the acronyms listed below refers to a comprehensive strategy and set of procedures designed to ensure that an organization can continue its critical operations and functions during and after a disruptive event?

A) BIA
B) SLE
C) BCP
D) BPA

A

C) BCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Given the computational limitations of IoT devices, smartcards, and mobile devices, which of the following digital signature algorithms would be the most efficient choice due to its smaller key size and lower computational requirements?

A) RSA
B) ECDHE
C) DSA
D) ECDSA
E) ECC

17
Q

Which type of software is used to prevent, detect, and remove malware from computer systems and networks?

A) IDS
B) SaaS
C) AV
D) WAF

18
Q

An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:

A) ALE
B) SLA
C) ARO
D) SLE

19
Q

Which of the answers listed below refers to a rule-based access control mechanism associated with files and/or directories?

A) EFS
B) FACL
C) FIM
D) NTFS

20
Q

Which of the following answers refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?

A) DKIM
B) SRV
C) CNAME
D) SPF

21
Q

Which of the answers listed below refers to a cryptographic method used to verify that a message or data has remained unaltered during transmission and originates from an authorized source?

A) MAC
B) CBC
C) PEM
D) GCM

22
Q

Which of the following answers refers to a network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?

A) UTM
B) WIDS
C) NGFW
D) WAF

23
Q

Which of the acronyms listed below refers to a client-server protocol that provides centralized AAA services for remote-access users?

A) OAuth
B) RADIUS
C) LDAP
D) OpenID

24
Q

Which type of software enables centralized administration of mobile devices?

A) MFA
B) MMC
C) MDM
D) MFD

25
Q

Which of the following defines a file format for storing and exchanging personal identity information, including private keys and digital certificates?

A) P10
B) P11
C) P12
D) P13

26
Q

Which of the answers listed below refers to a cryptographic key exchange protocol that leverages ECC for enhanced security and efficiency?

A) IKE
B) ECDHE
C) DHE
D) ECDSA

27
Q

The term “MTTF” refers to a metric that represents the average amount of time a device or system is expected to operate before experiencing its first failure.

A) True
B) False

28
Q

In modern OSs, this feature prevents malicious code from executing in certain memory regions intended for data.

A) DEP
B) ECB
C) DLP
D) CRC

28
Q

Which of the following enables the exchange of information between computer programs?

A) API
B) UI
C) Device drivers
D) SDK

29
Q

A cloud computing service model offering remote access to applications based on monthly or annual subscription fee is called:

A) PaaS
B) SaaS
C) IaaS
D) DaaS

30
Q

RTBH is a type of DDoS attack.

A) True
B) False

31
Q

Which AES key length provides the highest level of security?

A) 128-bit key
B) 192-bit key
C) 256-bit key
D) 320-bit key

A

C) 256-bit key

32
Q

Which of the answers listed below refers to a specific type of ICS?

A) SoC
B) CVSS
C) SCADA
D) RTOS

33
Q

The MIME specification extends the email message format beyond simple text, enabling the transfer of graphics, audio, and video files over the Internet mail system. S/MIME is an enhanced version of the MIME protocol that enables email security features by providing encryption, authentication, message integrity, and other related services.

A) True
B) False

34
Q

Which part of the IPsec protocol suite provides authentication and integrity?

A) CRC
B) AH
C) SIEM
D) AES