CompTIA Security+ Quiz 9 Flashcards

1
Q

Which of the following solutions would be best suited for a company that needs comprehensive IT services but lacks qualified IT personnel?

A) MSA
B) MaaS
C) MSP
D) MSSP

A

C) MSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the terms listed below refers to a third-party vendor offering IT security management services?

A) MSP
B) MaaS
C) MSA
D) MSSP

A

D) MSSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following acronyms refers to the broad category of hardware and software systems used for monitoring and controlling physical devices, processes, and industrial operations?

A) ICS
B) OT
C) SCADA
D) EDR

A

B) OT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the answers listed below refers to a basic method for establishing a dedicated point-to-point link between two networked devices?

A) PPTP
B) IGMP
C) PPP
D) MPLS

A

C) PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following defines the maximum acceptable amount of data loss measured by a specific point in time before a disaster or outage?

A) RPO
B) MTBF
C) RTO
D) MTTR

A

A) RPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the terms listed below refers to a framework for managing access to digital resources?

A) PAM
B) SSO
C) IAM
D) MFA

A

C) IAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refer to SCAP? (Select 3 answers)

A) A type of security system designed to collect logs and events from various sources

B) Designed to provide a centralized user interface for accessing collected data

C) A collection of standards developed by NIST

D) Provides a common language for communicating security information

E) Allows different security tools to share data and work together more effectively

F) Enables real-time threat detection, incident response, and compliance monitoring

A

C) A collection of standards developed by NIST

D) Provides a common language for communicating security information

E) Allows different security tools to share data and work together more effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Windows feature used for centrally managing and enforcing policies and settings for users and computers in a network is referred to as:

A) SAE
B) NTLM
C) GPO
D) SSO

A

C) GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a protocol used for automating the issuance and management of certificates within a PKI environment?

A) PKCS
B) SCEP
C) CSR
D) OCSP

A

B) SCEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below describe the characteristics of a non-persistent VDI? (Select 2 answers)

A) At the end of a session, user desktop reverts to its original state

B) Each user runs their own copy of virtual desktop

C) At the end of a session, user data and personal settings are saved

D) Virtual desktop is shared among multiple users

A

A) At the end of a session, user desktop reverts to its original state

D) Virtual desktop is shared among multiple users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?

A) SMTPS
B) SRTP
C) SHTTP
D) S/MIME

A

C) SHTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a persistent VDI: (Select 2 answers)

A) Each user runs their own copy of virtual desktop

B) At the end of a session, user desktop reverts to its original state

C) Virtual desktop is shared among multiple users

D) At the end of a session, user data and personal settings are saved

A

A) Each user runs their own copy of virtual desktop

D) At the end of a session, user data and personal settings are saved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An authentication mechanism that generates one-time passwords based on a counter value and a secret key is known as:

A) OAuth
B) HOTP
C) RADIUS
D) TOTP

A

B) HOTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the acronyms listed below refers to a documented process for addressing identified issues and preventing their repetition?

A) DRP
B) COOP
C) QA
D) CAR

A

D) CAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a software tool designed to simplify the process of creating and maintaining online content?

A) VDI
B) SaaS
C) CMS
D) SDK

A

C) CMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?

A) CBC
B) GCM
C) ECB
D) CFB

A

B) GCM

16
Q

The term “FPGA” refers to a reconfigurable integrated circuit that can be programmed and customized to perform various digital functions and tasks.

A) True
B) False

A

A) True

17
Q

Which of the answers listed below refer to SIEM? (Select 3 answers)

A) Allows different security tools to share data and work together more effectively

B) Designed to provide a centralized user interface for accessing collected data

C) A collection of standards developed by NIST

D) Enables real-time threat detection, incident response, and compliance monitoring

E) A type of security system designed to collect logs and events from various sources

F) Provides a common language for communicating security information

A

B) Designed to provide a centralized user interface for accessing collected data

D) Enables real-time threat detection, incident response, and compliance monitoring

E) A type of security system designed to collect logs and events from various sources

18
Q

Which of the following answers refers to a trusted third-party service for validating user identity in a federated identity system?

A) RA
B) IdP
C) CA
D) Kerberos

A

B) IdP

19
Q

Which of the answers listed below refers to a deprecated TLS-based method for securing SMTP?

A) IDPS
B) STARTTLS
C) DKIM
D) SMTPS

A

D) SMTPS

20
Q

Which of the following enables running macros in Microsoft Office applications?

A) DOM
B) API
C) DLL
D) VBA

A

D) VBA

20
Q

Which of the answers listed below refers to a language used to structure and describe data in a format that is both human- and machine-readable?

A) HTML
B) XML
C) JSON
D) XHTML

A

B) XML

21
Q

In SNMP, each node in a MIB is uniquely identified by a(n):

A) OID
B) IP
C) OUI
D) MAC

A

A) OID

22
Q

Which of the following acronyms refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?

A) CBC
B) GCM
C) ECB
D) CFB

A

A) CBC

22
Q

Which of the answers listed below refers to a dedicated protocol designed for enabling real-time text-based communication over the Internet?

A) IRC
B) RTC
C) IM
D) MMS

A

A) IRC

23
Q

A specialized electronic component that accelerates visual rendering is called:

A) TPU
B) GPU
C) DSP
D) CPU

A

B) GPU

24
Q

Which of the following answers refers to a protocol that enables the exchange of messages and data between applications running on different OSs and using different programming languages?

A) VDE
B) SOAP
C) VDI
D) SMTP

A

B) SOAP

25
Q

Which of the answers listed below refers to a deprecated MS Windows authentication protocol replaced by Kerberos?

A) PPTP
B) WEP
C) NTLM
D) SNMPv2

A

C) NTLM

25
Q

Which of the following enables delivery of various data packet types over the same network link?

A) LWAPP
B) MPLS
C) MLPPP
D) MIBS

A

B) MPLS

26
Q

Which of the answers listed below refers to a Windows-specific feature for handling exceptions, errors, and abnormal conditions in software?

A) EPC
B) SEH
C) EH
D) EXR

A

B) SEH

26
Q

Which of the following acronyms refers to a security mechanism used in the DNS to authenticate and secure communications between DNS servers during zone transfers and other transactions?

A) SOA
B) DKIM
C) SPF
D) TSIG

A

D) TSIG

27
Q

Which of the answers listed below refers to a cable rack that interconnects wiring between an MDF and workstation devices?

A) ICS
B) MDI
C) IDF
D) MTU

A

C) IDF

28
Q

Which of the following technologies enables automated handling of multiple security incidents?

A) SOAP
B) SIEM
C) SOAR
D) SASE

A

C) SOAR

29
Q

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?

A) DNAT
B) VLSM
C) MPLS
D) VLAN

A

B) VLSM

30
Q

Which of the following answers refer to the characteristic features of RSA? (Select 3 answers)

A) Asymmetric encryption algorithm

B) A public key used for encryption and a private key used for decryption

C) Suitable for bulk data encryption

D) Used for secure communications, digital signatures, and key exchange

E) Symmetric encryption algorithm

F) A single key used for both encryption and decryption

A

A) Asymmetric encryption algorithm

B) A public key used for encryption and a private key used for decryption

D) Used for secure communications, digital signatures, and key exchange