CompTIA Security+ Quiz 8 Flashcards
Which of the answers listed below refers to a mobile device’s built-in functionality enabling the usage of locator applications?
A) WPS
B) GSM
C) SIM
D) GPS
D) GPS
Which of the following answers refers to a unique 48-bit address assigned to every network adapter?
A) PIN
B) SSID
C) IP
D) MAC
D) MAC
In older, non-UEFI based PCs, the first sector of a storage drive containing information about partitions and a piece of executable code used to load the installed OS is called:
A) MBR
B) GPT
C) PXE
D) GUID
A) MBR
In cloud computing, users on an on-premises network take advantage of a transit gateway to connect to:
A) WAN
B) VPC
C) SAN
D) VLAN
B) VPC
Which of the answers listed below refer to DSA? (Select 3 answers)
A) Asymmetric algorithm
B) Used for the key exchange process
C) Symmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
F) Used for encryption
A) Asymmetric algorithm
D) Provides authentication, integrity, and non-repudiation
E) Specifically designed for creating and verifying digital signatures
Which of the following acronyms refer to office equipment that combines the functionality of multiple devices? (Select 2 answers)
A) MFD
B) IoT
C) MFP
D) PED
E) MFA
A) MFD
C) MFP
Which of the answers listed below describe(s) the characteristics of ECDSA? (Select all that apply)
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
C) Designed for data encryption
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
F) Enables the key exchange process
A) Provides authentication, integrity, and non-repudiation
B) Based on elliptic curve cryptography
D) Specifically designed for creating and verifying digital signatures
E) More computationally efficient than other signature algorithms
Which of the following answers refers to a deprecated stream cipher used in some legacy applications, such as WEP?
A) RSA
B) DES
C) SSL
D) RC4
D) RC4
Which of the answers listed below refers to a wireless network authentication protocol that enhances security by encapsulating the authentication process within an encrypted TLS tunnel?
A) PEAP
B) EAP
C) LEAP
D) RADIUS
A) PEAP
A type of metric used to evaluate the profitability of an investment by comparing the return generated from the investment relative to its cost is referred to as:
A) ROA
B) ROI
C) ROS
D) ROC
B) ROI
Which of the following facilitates the enforcement of mobile device policies and procedures?
A) MFA
B) MMC
C) MDM
D) MFD
C) MDM
Which of the answers listed below refers to an identifier used for objects in a PKI, such as CAs, digital certificates, and public key algorithms?
A) OID
B) DN
C) SAN
D) GUID
A) OID
Which of the following answers refers to a solution designed to strengthen the security of session keys?
A) ECB
B) PFS
C) EFS
D) PFX
B) PFS
Which of the answers listed below refers to a twisted-pair copper cabling type not surrounded by any shielding that would provide protection against interference from outside sources?
A) STP
B) Coax
C) UTP
D) Twinax
C) UTP
Which of the following terms refers to a technology that enables real-time audio and video communication between individuals or groups?
A) VPC
B) VTC
C) VoIP
D) VDI
B) VTC