CompTIA Security+ Quiz 9 Flashcards
Which of the following solutions would be best suited for a company that needs comprehensive IT services but lacks qualified IT personnel?
A) MSA
B) MaaS
C) MSP
D) MSSP
C) MSP
Which of the terms listed below refers to a third-party vendor offering IT security management services?
A) MSP
B) MaaS
C) MSA
D) MSSP
D) MSSP
Which of the following acronyms refers to the broad category of hardware and software systems used for monitoring and controlling physical devices, processes, and industrial operations?
A) ICS
B) OT
C) SCADA
D) EDR
B) OT
Which of the answers listed below refers to a basic method for establishing a dedicated point-to-point link between two networked devices?
A) PPTP
B) IGMP
C) PPP
D) MPLS
C) PPP
Which of the following defines the maximum acceptable amount of data loss measured by a specific point in time before a disaster or outage?
A) RPO
B) MTBF
C) RTO
D) MTTR
A) RPO
Which of the terms listed below refers to a framework for managing access to digital resources?
A) PAM
B) SSO
C) IAM
D) MFA
C) IAM
Which of the following answers refer to SCAP? (Select 3 answers)
A) A type of security system designed to collect logs and events from various sources
B) Designed to provide a centralized user interface for accessing collected data
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
F) Enables real-time threat detection, incident response, and compliance monitoring
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
A Windows feature used for centrally managing and enforcing policies and settings for users and computers in a network is referred to as:
A) SAE
B) NTLM
C) GPO
D) SSO
C) GPO
Which of the answers listed below refers to a protocol used for automating the issuance and management of certificates within a PKI environment?
A) PKCS
B) SCEP
C) CSR
D) OCSP
B) SCEP
Which of the answers listed below describe the characteristics of a non-persistent VDI? (Select 2 answers)
A) At the end of a session, user desktop reverts to its original state
B) Each user runs their own copy of virtual desktop
C) At the end of a session, user data and personal settings are saved
D) Virtual desktop is shared among multiple users
A) At the end of a session, user desktop reverts to its original state
D) Virtual desktop is shared among multiple users
Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?
A) SMTPS
B) SRTP
C) SHTTP
D) S/MIME
C) SHTTP
In a persistent VDI: (Select 2 answers)
A) Each user runs their own copy of virtual desktop
B) At the end of a session, user desktop reverts to its original state
C) Virtual desktop is shared among multiple users
D) At the end of a session, user data and personal settings are saved
A) Each user runs their own copy of virtual desktop
D) At the end of a session, user data and personal settings are saved
An authentication mechanism that generates one-time passwords based on a counter value and a secret key is known as:
A) OAuth
B) HOTP
C) RADIUS
D) TOTP
B) HOTP
Which of the acronyms listed below refers to a documented process for addressing identified issues and preventing their repetition?
A) DRP
B) COOP
C) QA
D) CAR
D) CAR
Which of the following answers refers to a software tool designed to simplify the process of creating and maintaining online content?
A) VDI
B) SaaS
C) CMS
D) SDK
C) CMS