CompTIA Security+ SY0-701 Exam Acronyms Flashcards
A network protocol used for secure file transfer over SSH is known as:
a. TFTP
b. SFTP
c. SCP
d. FTPS
Answer: SFTP
Secure File Transfer Protocol (SFTP) is a network protocol that uses Secure Shell (SSH) to securely transfer files between computers. SFTP is a key tool for data protection and cyber security, as it encrypts data to prevent unauthorized access.
Which of the answers listed below refers to a virtualization platform for delivering virtual desktops to a community of users?
a. VDE
b. VNC
c. VDI
d. RDP
Answer: C
In cyber security, “VDI” stands for “Virtual Desktop Infrastructure,” which is a technology that allows users to access a virtual desktop environment remotely from any device, essentially providing a secure way to access company data and applications from anywhere, without the need to physically be at their office workstation; this is often used for remote work scenarios and can enhance security by centralizing data storage and managing access to virtual desktops instead of individual physical machines.
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is called:
a. WPA
b. WPS
c. WEP
d. WAP
Answer: WPS
Wi-Fi Protected Setup (WPS) is a network security feature that allows users to connect devices to a secure wireless network. However, WPS can be vulnerable to brute-force attacks, which can allow unauthorized access to a network.
Which of the following answers refers to a text-based command interpreter and scripting language for Unix-like operating systems?
a. CLI
b. JS
c. Bash
d. cmd.exe
Answer: Bash
A networking hardware device connecting wireless devices to a wired network is referred to as:
a. WAF
b. AP
c.RAS
d. NIC
**Answer: AP **
In cybersecurity, AP stands for access point, a networking device that connects wireless devices to a wired network. Access points are also known as wireless access points (WAPs) or Wi-Fi routers
Which of the answers listed below refers to a mobile device deployment model where organizations provide and own the devices while allowing their personal use?
a. BYOD
b. COPE
c. VDI
d. CYOD
Answer: COPE
COPE (corporate-owned personally enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally owned notebook computers, tablets, or smartphones.
Which of the following answers refers to a non-cryptographic hash function often used for error-checking purposes?
a. MD5
b. CRC
c. SHA
d. RIPEMD
Answer: CRC
Cyclic Redundancy Check (CRC) is a technique used in cybersecurity to detect errors in data transmission. It’s a common method for ensuring that data has not been altered during transmission.
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
a.UDP
b.IP
c. TCP
d. NetBIOS
Answer:IP
The term “P2P” refers to a centralized network architecture in which each participant in the network can act both as a client and a server, enabling direct communication and file sharing between individual users without the need for a central server or intermediary.
a. True
b. False
** Answer: False **
Which of the answers listed below refers to a set of standards and specifications that define various cryptographic techniques, including formats for public keys, private keys, digital signatures, and digital certificates?
a. ITIL
b. RFC
c. PKCS
d. ISO/IEC
** Answer: PKCS **
Public Key Cryptography Standards (PKCS) are a set of protocols that help secure the exchange of information online. They are used in cybersecurity to protect data from digital threats and attacks.
Which of the following answers refers to a tunneling point-to-point protocol?
a. EAP
b. PPTP
c. MPLS
d. PPP
** Answer: PPTP **
Point-to-Point Tunneling Protocol (PPTP) is a network protocol that is no longer considered secure. It has many security vulnerabilities, including weak encryption and authentication, and is not recommended for use unless security is not a concern.
Which of the answers listed below refers to a logical operation commonly used in the context of cybersecurity, particularly in encryption and obfuscation techniques?
a. AND
b. OR
c. NOT
d. XOR
** Answer: XOR **
XOR (eXclusive OR) is a Boolean logic operation used in cybersecurity to encrypt and decrypt data. It’s a fundamental technique in cryptographic algorithms that protects sensitive information from unauthorized access.
Which of the following answers refers to a public-key cryptosystem used for digital signatures, secure key exchange, and encryption?
a. DHE
b. RSA
c. AES
d. DSA
** Answer: RSA **
RSA is a popular and secure cryptographic algorithm that encrypts and decrypts data. It provides a secure method for transmitting sensitive data over the Internet. While RSA has some vulnerabilities, it is still utilized for various applications, like digital signatures to authenticate the source of a message.
An authentication mechanism that generates one-time passwords based on the current time and a secret key is known as:
a. OAuth
b. TOTP
c. RADIUS
d. HOTP
** Answer: TOTP **
TOTP stands for Time-based One-Time Passwords and is a common form of two-factor authentication (2FA). Unique numeric passwords are generated with a standardized algorithm that uses the current time as an input.
Which of the answers listed below refers to the process of maintaining the integrity of files and data?
a. DLP
b. SIEM
c. FIM
d. SHA
** Answer: FIM **
In cybersecurity, “FIM” stands for “File Integrity Monitoring,” which refers to a security process that continuously checks and verifies the integrity of critical system files, like operating system files, database files, and application files, to detect if they have been tampered with or corrupted, essentially identifying unauthorized changes by comparing them to a trusted baseline.
Which of the following provides a countermeasure against SPOF?
a. HA
b. DLP
c. VM
d. AAA
** Answer: HA **
High Availability (HA) firewall clusters are designed to minimize downtime for critical systems through the use of redundant systems. HA firewalls can maximize the availability of critical services using various clustering modes, such as active/active vs. active/passive.
A single point of failure (SPOF) is a potential risk posed by a flaw in the design, implementation or configuration of a circuit or system. SPOF refers to one fault or malfunction that can cause an entire system to stop operating.
Which of the answers listed below refers to a method that enables secure conversion of user passwords into cryptographic keys?
a. PBKDF2
b. PFS
c. RIPEMD
d. PKCS #7
** Answer: PBKDF2 **
Password-Based Key Derivation Function 2 (PBKDF2) is a cryptographic algorithm that strengthens the security of passwords. It’s used in many applications, including online services, mobile devices, and financial systems.
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
a. Auditing
b. Authentication
c. Authorization
d. Accounting
** Answer: Accounting **
Accounting cybersecurity is the use of systems and risk management plans to protect financial data and accounting firms from cyberattacks and data breaches. It’s a critical part of financial management and risk mitigation.
Which of the following solutions provides passive network security breach response on an individual computer system?
a. HIDS
b. NIPS
c. HIPS
d. NIDS
** Answer: HIDS **
A Host-Based Intrusion Detection System (HIDS) is a security tool that monitors a device for suspicious activity. HIDS can detect unauthorized access and malicious activity on a device, such as a server, workstation, or mobile device.
A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as:
a. DSU
b. CSU
c. FPS
d.MTU
** Answer: MTU **
In cybersecurity, MTU stands for “Maximum Transmission Unit,” which refers to the largest data packet size that a network device can accept and transmit without fragmentation, essentially defining the maximum size of a data packet that can be sent across a network connection, including all headers and payload data; it’s a crucial consideration when managing network traffic and mitigating potential security risks associated with packet fragmentation.
Which of the following answers refers to a deprecated (largely replaced by AES) symmetric-key block cipher encryption algorithm?
a. ECDSA
b. RSA
c. IDEA
d. DSA
** Answer: IDEA **
International Data Encryption Algorithm (IDEA) is a form of symmetric key block cipher encryption. IDEA uses a 128-bit key and operates on 64-bit blocks. Essentially, it encrypts a 64-bit block of plaintext into a 64-bit block of ciphertext.
- IDEA was intended to replace the Data Encryption Standard (DES)
- It was used in some versions of Pretty Good Privacy (PGP)
Which of the answers listed below refers to a system that identifies, defines, and catalogs publicly known cybersecurity vulnerabilities?
a. TAXII
b. CVE
c. STIX
d. CVSS
** Answer: CVE **
TAXII, short for Trusted Automated eXchange of Intelligence Information, defines how cyber threat information can be shared via services and message exchanges. It is designed specifically to support STIX information, which it does by defining an API that aligns with common sharing models.
Structured Threat Information Expression (STIX) is a language for sharing cyber threat intelligence (CTI). It’s a free, open-source standard that allows users to describe cyber threats consistently.
Which of the answers listed below refers to a standardized method employed by the U.S. federal government to authenticate the identities of employees and contractors via smart card-based credentials?
a. PIV
b. MFA
c. SAE
d. PKI
** Answer: PIV **
Personal Identity Verification (PIV) is a federal government credential that uses a computer chip to verify identity and encrypt data. PIV cards are used to access secure facilities and information systems.
Which of the following answers refers to an organized approach to managing and mitigating security incidents?
a. XDR
b. IR
c. SOAR
d. IRP
** Answer: IR **
In cybersecurity, “IR” stands for “Incident Response,” which refers to the planned and coordinated actions an organization takes to detect, contain, investigate, and recover from a security breach or cyberattack, aiming to minimize damage and restore normal operations as quickly as possible.
Which type of technology enables contactless payment transactions?
a. NFC
b. IR
c. PED
d. WAP
** Answer: NFC **
In cybersecurity, NFC (Near Field Communication) refers to a short-range wireless technology that enables data transfer between devices in close proximity, often used for contactless payments, but also presents security concerns due to the potential for eavesdropping, data modification, and “man-in-the-middle” attacks if not properly secured with encryption and authentication protocols; essentially, malicious actors could intercept sensitive information transmitted between NFC-enabled devices if not adequately protected
Which of the answers listed below refers to a cybersecurity approach that focuses on recognizing and addressing potential threats originating from multiple sources?
a. XDR
b. WAF
c. EDR
d. SWG
** Answer: XDR **
Extended Detection and Response (XDR) is a cybersecurity platform that collects and analyzes security data to detect and respond to threats. XDR uses AI and automation to help organizations protect against cyberattacks.
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as:
a. SOW
b. MSA
c. SLA
d. MOU
** Answer: SLA **
In cybersecurity, an SLA (Service Level Agreement) is a contract between a service provider and a client that outlines the expected level of cybersecurity service, defining the responsibilities, performance standards, and response times for managing security risks, including details like vulnerability remediation timelines, data confidentiality requirements, and incident response procedures, essentially setting clear expectations for both parties involved.
Which of the following acronyms refers to a client authentication method used in WPA3?
a. SAE
b. IKE
c. PSK
d. AES
** Answer: SAE **
SAE stands for Simultaneous Authentication of Equals, a password-based authentication protocol used in cybersecurity to improve security against attacks. SAE is part of the WPA3 security standard