CompTIA Security+ Quiz 9 Flashcards
Which of the following solutions would be best suited for a company that needs comprehensive IT services but lacks qualified IT personnel?
A) MSA
B) MaaS
C) MSP
D) MSSP
C) MSP
Which of the terms listed below refers to a third-party vendor offering IT security management services?
A) MSP
B) MaaS
C) MSA
D) MSSP
D) MSSP
Which of the following acronyms refers to the broad category of hardware and software systems used for monitoring and controlling physical devices, processes, and industrial operations?
A) ICS
B) OT
C) SCADA
D) EDR
B) OT
Which of the answers listed below refers to a basic method for establishing a dedicated point-to-point link between two networked devices?
A) PPTP
B) IGMP
C) PPP
D) MPLS
C) PPP
Which of the following defines the maximum acceptable amount of data loss measured by a specific point in time before a disaster or outage?
A) RPO
B) MTBF
C) RTO
D) MTTR
A) RPO
Which of the terms listed below refers to a framework for managing access to digital resources?
A) PAM
B) SSO
C) IAM
D) MFA
C) IAM
Which of the following answers refer to SCAP? (Select 3 answers)
A) A type of security system designed to collect logs and events from various sources
B) Designed to provide a centralized user interface for accessing collected data
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
F) Enables real-time threat detection, incident response, and compliance monitoring
C) A collection of standards developed by NIST
D) Provides a common language for communicating security information
E) Allows different security tools to share data and work together more effectively
A Windows feature used for centrally managing and enforcing policies and settings for users and computers in a network is referred to as:
A) SAE
B) NTLM
C) GPO
D) SSO
C) GPO
Which of the answers listed below refers to a protocol used for automating the issuance and management of certificates within a PKI environment?
A) PKCS
B) SCEP
C) CSR
D) OCSP
B) SCEP
Which of the answers listed below describe the characteristics of a non-persistent VDI? (Select 2 answers)
A) At the end of a session, user desktop reverts to its original state
B) Each user runs their own copy of virtual desktop
C) At the end of a session, user data and personal settings are saved
D) Virtual desktop is shared among multiple users
A) At the end of a session, user desktop reverts to its original state
D) Virtual desktop is shared among multiple users
Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?
A) SMTPS
B) SRTP
C) SHTTP
D) S/MIME
C) SHTTP
In a persistent VDI: (Select 2 answers)
A) Each user runs their own copy of virtual desktop
B) At the end of a session, user desktop reverts to its original state
C) Virtual desktop is shared among multiple users
D) At the end of a session, user data and personal settings are saved
A) Each user runs their own copy of virtual desktop
D) At the end of a session, user data and personal settings are saved
An authentication mechanism that generates one-time passwords based on a counter value and a secret key is known as:
A) OAuth
B) HOTP
C) RADIUS
D) TOTP
B) HOTP
Which of the acronyms listed below refers to a documented process for addressing identified issues and preventing their repetition?
A) DRP
B) COOP
C) QA
D) CAR
D) CAR
Which of the following answers refers to a software tool designed to simplify the process of creating and maintaining online content?
A) VDI
B) SaaS
C) CMS
D) SDK
C) CMS
Which block cipher mode combines CTM for encryption with an authentication mechanism to ensure both data confidentiality and integrity?
A) CBC
B) GCM
C) ECB
D) CFB
B) GCM
The term “FPGA” refers to a reconfigurable integrated circuit that can be programmed and customized to perform various digital functions and tasks.
A) True
B) False
A) True
Which of the answers listed below refer to SIEM? (Select 3 answers)
A) Allows different security tools to share data and work together more effectively
B) Designed to provide a centralized user interface for accessing collected data
C) A collection of standards developed by NIST
D) Enables real-time threat detection, incident response, and compliance monitoring
E) A type of security system designed to collect logs and events from various sources
F) Provides a common language for communicating security information
B) Designed to provide a centralized user interface for accessing collected data
D) Enables real-time threat detection, incident response, and compliance monitoring
E) A type of security system designed to collect logs and events from various sources
Which of the following answers refers to a trusted third-party service for validating user identity in a federated identity system?
A) RA
B) IdP
C) CA
D) Kerberos
B) IdP
Which of the answers listed below refers to a deprecated TLS-based method for securing SMTP?
A) IDPS
B) STARTTLS
C) DKIM
D) SMTPS
D) SMTPS
Which of the following enables running macros in Microsoft Office applications?
A) DOM
B) API
C) DLL
D) VBA
D) VBA
Which of the answers listed below refers to a language used to structure and describe data in a format that is both human- and machine-readable?
A) HTML
B) XML
C) JSON
D) XHTML
B) XML
In SNMP, each node in a MIB is uniquely identified by a(n):
A) OID
B) IP
C) OUI
D) MAC
A) OID
Which of the following acronyms refers to a block cipher mode that works by chaining the ciphertext blocks together, such that each ciphertext block depends on the previous block?
A) CBC
B) GCM
C) ECB
D) CFB
A) CBC
Which of the answers listed below refers to a dedicated protocol designed for enabling real-time text-based communication over the Internet?
A) IRC
B) RTC
C) IM
D) MMS
A) IRC
A specialized electronic component that accelerates visual rendering is called:
A) TPU
B) GPU
C) DSP
D) CPU
B) GPU
Which of the following answers refers to a protocol that enables the exchange of messages and data between applications running on different OSs and using different programming languages?
A) VDE
B) SOAP
C) VDI
D) SMTP
B) SOAP
Which of the answers listed below refers to a deprecated MS Windows authentication protocol replaced by Kerberos?
A) PPTP
B) WEP
C) NTLM
D) SNMPv2
C) NTLM
Which of the following enables delivery of various data packet types over the same network link?
A) LWAPP
B) MPLS
C) MLPPP
D) MIBS
B) MPLS
Which of the answers listed below refers to a Windows-specific feature for handling exceptions, errors, and abnormal conditions in software?
A) EPC
B) SEH
C) EH
D) EXR
B) SEH
Which of the following acronyms refers to a security mechanism used in the DNS to authenticate and secure communications between DNS servers during zone transfers and other transactions?
A) SOA
B) DKIM
C) SPF
D) TSIG
D) TSIG
Which of the answers listed below refers to a cable rack that interconnects wiring between an MDF and workstation devices?
A) ICS
B) MDI
C) IDF
D) MTU
C) IDF
Which of the following technologies enables automated handling of multiple security incidents?
A) SOAP
B) SIEM
C) SOAR
D) SASE
C) SOAR
What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
A) DNAT
B) VLSM
C) MPLS
D) VLAN
B) VLSM
Which of the following answers refer to the characteristic features of RSA? (Select 3 answers)
A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
C) Suitable for bulk data encryption
D) Used for secure communications, digital signatures, and key exchange
E) Symmetric encryption algorithm
F) A single key used for both encryption and decryption
A) Asymmetric encryption algorithm
B) A public key used for encryption and a private key used for decryption
D) Used for secure communications, digital signatures, and key exchange