CompTIA Security+ Quiz 6 Flashcards

1
Q

A network protocol used for secure file transfer over SSH is known as:

A) TFTP
B) SFTP
C) SCP
D) FTPS

A

B) SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?

A) VDE
B) VNC
C) VDI
D) RDP

A

C) VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:

A) WPA
B) WPS
C) WEP
D) WAP

A

B) WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?

A) CLI
B) JS
C) Bash
D) cmd.exe

A

C) Bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A networking hardware device connecting wireless devices to a wired network is referred to as:

A) WAF
B) AP
C) RAS
D) NIC

A

B) AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?

A) BYOD
B) COPE
C) VDI
D) CYOD

A

B) COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?

A) MD5
B) CRC
C) SHA
D) RIPEMD

A

B) CRC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the name of a network layer protocol that specifies the format of packets and addressing
scheme in network communications?

A) UDP
B) IP
C) TCP
D) NetBIOS

A

B) IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term “P2P” refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.

A) True
B) False

A

B) False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?

A) ITIL
B) RFC
C) PKCS
D) ISO/IEC

A

C) PKCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to a tunneling point-to-point protocol?

A) EAP
B) PPTP
C) MPLS
D) PPP

A

B) PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?

A) AND
B) OR
C) NOT
D) XOR

A

D) XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?

A) DHE
B) RSA
C) AES
D) DSA

A

B) RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:

A) OAuth
B) TOTP
C) RADIUS
D) HOTP

A

B) TOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to the process of maintaining the integrity of files and data?

A) DLP
B) SIEM
C) FIM
D) SHA

A

C) FIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following provides a countermeasure against SPOF?

A) HA
B) DLP
C) VM
D) AAA

A

A) HA

16
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:

A) Auditing
B) Authentication
C) Authorization
D) Accounting

A

D) Accounting

17
Q

Which of the answers listed below refers to a method that enables secure conversion of user passwords into cryptographic keys?

A) PBKDF2
B) PFS
C) RIPEMD
D) PKCS #7

A

A) PBKDF2

18
Q

Which of the following solutions provides passive network security breach response on an individual computer system?

A) HIDS
B) NIPS
C) HIPS
D) NIDS

A

A) HIDS

19
Q

Which of the answers listed below refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?

A) TAXII
B) CVE
C) STIX
D) CVSS

A

B) CVE

20
Q

Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?

A) ECDSA
B) RSA
C) IDEA
D) DSA

A

C) IDEA

21
Q

Which of the answers listed below refers to a standardized method employed by the U.S. federal government to authenticate the identities of employees and contractors via smart card-based credentials?

A) PIV
B) MFA
C) SAE
D) PKI

A

A) PIV

21
Q

A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:

A) DSU
B) CSU
C) FPS
D) MTU

A

D) MTU

22
Q

Which of the following answers refers to an organized approach to managing and mitigating security incidents?

A) XDR
B) IR
C) SOAR
D) IRP

A

B) IR

23
Q

Which type of technology enables contactless payment transactions?

A) NFC
B) IR
C) PED
D) WAP

A

A) NFC

24
Q

An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as:

A) SOW
B) MSA
C) SLA
D) MOU

A

C) SLA

24
Q

Which of the answers listed below refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources?

A) XDR
B) WAF
C) EDR
D) SWG

A

A) XDR

25
Q

Which of the following acronyms refers to a client authentication method used in WPA3?

A) SAE
B) IKE
C) PSK
D) AES

A

A) SAE

26
Q

Which of the following answers refers to a security solution that provides control over elevated (i.e., administrative type) accounts?

A) MFA
B) IAM
C) SSO
D) PAM

A

D) PAM

26
Q

Which of the answers listed below refers to a solution used for authentication, authorization, and user identity management?

A) ICS
B) AAA
C) CIA
D) IAM

A

D) IAM

27
Q

A device designed to provide emergency power during an unexpected main power source outage is called:

A) UPS
B) PoE
C) SVC
D) PSU

A

A) UPS

28
Q

Which of the answers listed below refers to an authentication method that enables the signing of an outbound email message with a digital signature?

A) SPF
B) DKIM
C) SRV
D) DMARC

A

B) DKIM

29
Q

The term “VLAN” refers to a logical grouping of computers that allow computer hosts to function as if they were attached to the same broadcast domain regardless of their physical location.

A) True
B) False

A

A) True

30
Q

Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information?

A) PAT
B) NAC
C) DNS
D) ARP

A

A) PAT

31
Q

A file system format used in Windows OSs that offers improved performance, security, and file management is referred to as:

A) ext4
B) EFS
C) NTFS
D) HFS+

A

C) NTFS