CompTIA Security+ Quiz 6 Flashcards
A network protocol used for secure file transfer over SSH is known as:
A) TFTP
B) SFTP
C) SCP
D) FTPS
B) SFTP
Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?
A) VDE
B) VNC
C) VDI
D) RDP
C) VDI
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:
A) WPA
B) WPS
C) WEP
D) WAP
B) WPS
Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?
A) CLI
B) JS
C) Bash
D) cmd.exe
C) Bash
A networking hardware device connecting wireless devices to a wired network is referred to as:
A) WAF
B) AP
C) RAS
D) NIC
B) AP
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
A) BYOD
B) COPE
C) VDI
D) CYOD
B) COPE
Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?
A) MD5
B) CRC
C) SHA
D) RIPEMD
B) CRC
What is the name of a network layer protocol that specifies the format of packets and addressing
scheme in network communications?
A) UDP
B) IP
C) TCP
D) NetBIOS
B) IP
The term “P2P” refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.
A) True
B) False
B) False
Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?
A) ITIL
B) RFC
C) PKCS
D) ISO/IEC
C) PKCS
Which of the following answers refers to a tunneling point-to-point protocol?
A) EAP
B) PPTP
C) MPLS
D) PPP
B) PPTP
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
A) AND
B) OR
C) NOT
D) XOR
D) XOR
Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?
A) DHE
B) RSA
C) AES
D) DSA
B) RSA
An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:
A) OAuth
B) TOTP
C) RADIUS
D) HOTP
B) TOTP
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
A) DLP
B) SIEM
C) FIM
D) SHA
C) FIM