CompTIA Security+ Quiz 7 Flashcards
What is the fastest way for checking the validity of a digital certificate?
A) CRL
B) OSPF
C) CSR
D) OCSP
D) OCSP
Which of the terms listed below refers to a process of intercepting network traffic data for analysis and troubleshooting purposes?
A) AIS
B) PCAP
C) EDR
D) MaaS
B) PCAP
In a Kerberos-protected network, this type of secure token is granted to users during their initial login to enable them access to multiple network services without the need to re-enter their login information.
A) OTP
B) TGT
C) AS
D) TGS
B) TGT
Which of the following answers refers to a language primarily used for automating the assessment of security vulnerabilities and configuration issues on computer systems?
A) OVAL
B) SAML
C) XML
D) SOAP
A) OVAL
A remote access authentication protocol used primarily in Microsoft networks that periodically re-authenticates client at random intervals to prevent session hijacking is known as:
A) PEAP
B) MSCHAP
C) LEAP
D) CHAP
B) MSCHAP
Which of the acronyms listed below refers to a formal and legally binding document that specifies detailed terms, obligations, and responsibilities of all parties involved?
A) SOW
B) MOA
C) MSA
D) MOU
B) MOA
Which of the following answers refers to CSRF?
A) A cyberattack in which an attacker intercepts and maliciously retransmits data or authentication requests to gain unauthorized access or impersonate a legitimate user or system
B) A type of malicious attack where unauthorized commands are transmitted from a user’s browser to a web application without their knowledge or consent, often leading to actions being taken on their behalf
C) A security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, potentially leading to data theft or manipulation
D) A type of cyberattack where malicious code is injected into a web application’s input fields to manipulate the database and gain unauthorized access to data or perform malicious actions
B) A type of malicious attack where unauthorized commands are transmitted from a user’s browser to a web application without their knowledge or consent, often leading to actions being taken on their behalf
ARP provides:
A) IP-to-FQDN mapping
B) MAC-to-IP mapping
C) FQDN-to-IP mapping
D) IP-to-MAC mapping
D) IP-to-MAC mapping
A set of procedures put in place to recover IT systems and data following a major disruption is called:
A) DRP
B) BIA
C) SLE
D) BCP
A) DRP
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?
A) NTP
B) VTP
C) NNTP
D) RTP
A) NTP
An integrated circuit combining components typically found in a standard computer system is referred to as:
A) HSM
B) TPM
C) SoC
D) BIOS
C) SoC
Which of the answers listed below refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets?
A) CCMP
B) RSTP
C) ICMP
D) SNMP
C) ICMP
Which of the following acronyms refers to a document that authorizes, initiates, and tracks the progress and completion of a particular job or task?
A) SOW
B) WO
C) SLA
D) MSA
B) WO
Which of the following terms refer to the characteristic features of DSL? (Select 3 answers)
A) Leased lines
B) Copper cabling
C) Telephone lines
D) Fiber-optic cabling
E) Last mile solutions
F) WAN links
A) Leased lines
B) Copper cabling
E) Last mile solutions
A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:
A) RA
B) IKE
C) CA
D) CSP
C) CA