CompTIA Security+ Quiz 6 Flashcards
A network protocol used for secure file transfer over SSH is known as:
A) TFTP
B) SFTP
C) SCP
D) FTPS
B) SFTP
Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?
A) VDE
B) VNC
C) VDI
D) RDP
C) VDI
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:
A) WPA
B) WPS
C) WEP
D) WAP
B) WPS
Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?
A) CLI
B) JS
C) Bash
D) cmd.exe
C) Bash
A networking hardware device connecting wireless devices to a wired network is referred to as:
A) WAF
B) AP
C) RAS
D) NIC
B) AP
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
A) BYOD
B) COPE
C) VDI
D) CYOD
B) COPE
Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?
A) MD5
B) CRC
C) SHA
D) RIPEMD
B) CRC
What is the name of a network layer protocol that specifies the format of packets and addressing
scheme in network communications?
A) UDP
B) IP
C) TCP
D) NetBIOS
B) IP
The term “P2P” refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.
A) True
B) False
B) False
Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?
A) ITIL
B) RFC
C) PKCS
D) ISO/IEC
C) PKCS
Which of the following answers refers to a tunneling point-to-point protocol?
A) EAP
B) PPTP
C) MPLS
D) PPP
B) PPTP
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
A) AND
B) OR
C) NOT
D) XOR
D) XOR
Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?
A) DHE
B) RSA
C) AES
D) DSA
B) RSA
An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:
A) OAuth
B) TOTP
C) RADIUS
D) HOTP
B) TOTP
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
A) DLP
B) SIEM
C) FIM
D) SHA
C) FIM
Which of the following provides a countermeasure against SPOF?
A) HA
B) DLP
C) VM
D) AAA
A) HA
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
A) Auditing
B) Authentication
C) Authorization
D) Accounting
D) Accounting
Which of the answers listed below refers to a method that enables secure conversion of user passwords into cryptographic keys?
A) PBKDF2
B) PFS
C) RIPEMD
D) PKCS #7
A) PBKDF2
Which of the following solutions provides passive network security breach response on an individual computer system?
A) HIDS
B) NIPS
C) HIPS
D) NIDS
A) HIDS
Which of the answers listed below refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?
A) TAXII
B) CVE
C) STIX
D) CVSS
B) CVE
Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?
A) ECDSA
B) RSA
C) IDEA
D) DSA
C) IDEA
Which of the answers listed below refers to a standardized method employed by the U.S. federal government to authenticate the identities of employees and contractors via smart card-based credentials?
A) PIV
B) MFA
C) SAE
D) PKI
A) PIV
A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:
A) DSU
B) CSU
C) FPS
D) MTU
D) MTU
Which of the following answers refers to an organized approach to managing and mitigating security incidents?
A) XDR
B) IR
C) SOAR
D) IRP
B) IR
Which type of technology enables contactless payment transactions?
A) NFC
B) IR
C) PED
D) WAP
A) NFC
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as:
A) SOW
B) MSA
C) SLA
D) MOU
C) SLA
Which of the answers listed below refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources?
A) XDR
B) WAF
C) EDR
D) SWG
A) XDR
Which of the following acronyms refers to a client authentication method used in WPA3?
A) SAE
B) IKE
C) PSK
D) AES
A) SAE
Which of the following answers refers to a security solution that provides control over elevated (i.e., administrative type) accounts?
A) MFA
B) IAM
C) SSO
D) PAM
D) PAM
Which of the answers listed below refers to a solution used for authentication, authorization, and user identity management?
A) ICS
B) AAA
C) CIA
D) IAM
D) IAM
A device designed to provide emergency power during an unexpected main power source outage is called:
A) UPS
B) PoE
C) SVC
D) PSU
A) UPS
Which of the answers listed below refers to an authentication method that enables the signing of an outbound email message with a digital signature?
A) SPF
B) DKIM
C) SRV
D) DMARC
B) DKIM
The term “VLAN” refers to a logical grouping of computers that allow computer hosts to function as if they were attached to the same broadcast domain regardless of their physical location.
A) True
B) False
A) True
Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information?
A) PAT
B) NAC
C) DNS
D) ARP
A) PAT
A file system format used in Windows OSs that offers improved performance, security, and file management is referred to as:
A) ext4
B) EFS
C) NTFS
D) HFS+
C) NTFS