CompTIA Security+ SY0-701 Exam Acronyms 2 Flashcards
Which of the following acronyms refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information?
a. IPS
b. DLP
c. IDS
d. DEP
** Answer: DLP **
A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as:
a. ACL
b. CSR
c. MAC
d. AUP
** Answer: ACL **
Network Access Control List Meaning. A network access control list (ACL) is made up of rules that either allow access to a computer environment or deny it. In a way, an ACL is like a guest list at an exclusive club. Only those on the list are allowed in the doors.
Which type of firmware performs initial hardware checks after the computer is powered on?
a. BIOS
b. POST
c. CMOS
d. PROM
** Answer: BIOS **
Which of the answers listed below refers to a software technology designed to simplify network infrastructure management?
a. SDN
b. QoS
c. VDI
d. CDN
** Answer: SDN **
SDN (Software-Defined Networking) refers to a network architecture where the network infrastructure is controlled by a centralized software controller, enabling granular management of network traffic and security policies, providing enhanced visibility and the ability to react quickly to potential threats across the entire network, compared to traditional, hardware-based network management
Which of the following is an MS Windows component that enables encryption of individual files?
a. EFS
b. NTFS
c. DFS
d. NFS
** Answer: EFS **
EFS is a user-based encryption control technique that enables users to control who can read the files on their system. The typical method of using EFS is to perform encryption at the folder level. This ensures that all files added to the encrypted folder are automatically encrypted.
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
a. WWAN
b. VPN
c. PAN
d. VLAN
** Answer: VPN **
A virtual private network (VPN) is a security tool that encrypts data and masks IP addresses to protect users from cyber threats. VPNs are used to create secure connections between devices and networks, allowing users to access the internet and work remotely.
Which of the answers listed below refers to a security standard introduced to address the vulnerabilities found in WEP?
a. TKIP
b. AES
c. WPA
d. CCMP
** Answer: WPA **
Wi-Fi Protected Access (WPA) is a security protocol that protects wireless networks from unauthorized access. It uses encryption and authentication to ensure that only authorized users can access the network
The term “KEK” refers to a type of cryptographic key often used in key management systems to add an additional layer of security when encrypting and decrypting other cryptographic keys.
True
False
** Answer: True **
POP3 is used for:
a. Name resolution
b. Sending email messages
c. File exchange
d. Email retrieval
** Answer: Email retrieval **
In cybersecurity, POP3 (Post Office Protocol Version 3) refers to an email retrieval protocol that can be considered a security risk due to its inherent vulnerabilities, primarily because it often transmits data like usernames and passwords in plain text, making it susceptible to eavesdropping and interception by malicious actors if not properly secured with encryption like POP3S (POP3 over SSL/TLS).
Which cloud service model would provide the best solution for a web developer intending to create a web app?
a. XaaS
b. SaaS
c. PaaS
d. IaaS
** Answer: PaaS **
Platform as a Service (PaaS) security is the protection of applications, data, and infrastructure on a PaaS platform. It involves preventing unauthorized access, data breaches, and other cyber threats.
Platform-as-a-service (PaaS) is a complete, scalable development and deployment environment that is sold as a subscription service.
Which of the following answers refers to a cryptographic hash function that has been widely used in the past but is now considered deprecated for security-sensitive applications due to known vulnerabilities?
a. MD5
b. SHA
c. CRC
d. HMAC
** Answer: MD5 **
What is MD5? MD5 (message-digest algorithm) is a cryptographic protocol used for authenticating messages as well as content verification and digital signatures. MD5 is based on a hash function that verifies that a file you sent matches the file received by the person you sent it to.
Why MD5 is not recommended for security
- MD5 has been found to have many vulnerabilities
- MD5-hashed passwords are susceptible to cracking techniques
- Stronger hash functions like SHA-256 are available
Which of the answers listed below refers to a suite of protocols and technologies providing encryption, authentication, and data integrity for network traffic?
a. TLS
b. SSH
c. IPsec
d. VPN
** Answer: IPsec **
IPSec is a set of communication rules or protocols for setting up secure connections over a network. Internet Protocol (IP) is the common standard that determines how data travels over the internet. IPSec adds encryption and authentication to make the protocol more secure.
A network protocol providing an alternative solution to the manual allocation of IP addresses is called:
a. DNS
b. SNMP
c. NAT
d. DHCP
** Answer: DHCP **
Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically assigns IP addresses to devices on a network. It’s a fundamental part of network administration and is used in most modern networks.
Which of the following regulations protects the privacy and personal data of the EU citizens?
a. PHI
b. HIPAA
c. PCI DSS
d. GDPR
** Answer: GDPR **
In cybersecurity, GDPR (General Data Protection Regulation) refers to a strict European Union law that mandates organizations to implement robust security measures to protect the personal data of individuals within the EU, requiring them to handle data responsibly and with appropriate technical and organizational controls to prevent breaches and unauthorized access, essentially setting a high standard for data privacy protection within the cybersecurity landscape; non-compliance can result in significant fines.
Which of the answers listed below refers to a mechanical data storage medium type that relies on magnetic plates and moving parts for data storage and retrieval?
a. RAM
b. HDD
c. NVMe
d. SSD
** Answer: HDD **
In cybersecurity, “HDD” stands for “Hard Disk Drive,” which refers to the physical storage device within a computer where sensitive data is stored, and in the context of security, the primary concern is protecting that data through encryption methods like “full disk encryption” to prevent unauthorized access if the device is compromised by a hacker.
Which of the following terms refers to an environmental control system?
a. SCADA
b. HIPS
c. TEMPEST
d. HVAC
** Answer: HVAC **
HVAC cybersecurity protects HVAC systems from cyber threats by implementing security measures to prevent unauthorized access. This is important because HVAC systems are often connected to critical infrastructure and can be used as an entry point for hackers.
A type of network connecting computers within a small geographical area such as a building or group of buildings is referred to as:
a. PAN
b. LAN
c. MAN
d. WAN
** Answer: LAN **
Local Area Network (LAN) security is a set of practices and technologies that protect a network’s data, systems, and resources from cyber threats. LAN security aims to prevent unauthorized access, data breaches, and other digital threats.
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
a. QoS
b. DHCP
c. NAT
d. DNS
** Answer: NAT **
In cyber security, “NAT” stands for “Network Address Translation,” which is a technology that allows multiple devices on a private network to access the internet using a single public IP address, essentially hiding the internal network from the outside world and providing an added layer of security by masking internal IP addresses.
Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?
a. PSK
b. 802.1X
c. SAE
d. TKIP
** Answer: PSK **
A Pre-Shared Key (PSK) is a secret password or code that is shared between two or more parties before communication. It’s used in cybersecurity to secure wireless networks and other communication channels.
WPA2-PSK (Pre-Shared Key) is a specific authentication method used within the WPA2 framework. It utilizes a pre-shared key, also known as a passphrase or password, that is shared among the network administrator and the users of the network.
Copies of lost private encryption keys can be retrieved from a key escrow by RAs (i.e., individuals with access to key database and permission level allowing them to extract keys from escrow).
True
False
** Answer: True **
Which type of unsolicited messaging relies on text-based communication?
a. VAM
b. SPIM
c. JMS
d. SPIT
** Answer: SPIM **
SPIM stands for Spam over Instant Messaging and is a type of cyber security threat that involves sending unwanted messages through instant messaging apps. SPIM messages are often intrusive and may contain spyware or viruses.
Which of the answers listed below refers to a secure replacement for Telnet?
a. CHAP
b. FTP
c. SNMP
d. SSH
** Answer: SSH **
Which of the following answers refers to a family of cryptographic hash functions used in a variety of security applications, including digital signatures, password storage, secure communications, and data integrity verification?
a. RSA
b. IDEA
c. AES
d. SHA
** Answer: SHA **
SHA stands for Secure Hash Algorithm, which is a family of cryptographic functions that are used to hash data and certificate files. SHA is a key tool in cybersecurity, helping to ensure data integrity and the security of digital communication.
In the AAA security architecture, the process of granting or denying access to resources is known as:
a. Auditing
b. Authentication
c. Authorization
d. Accounting
** Answer: Authorization **
In cybersecurity, “authorization” refers to the process of determining whether a verified user (after authentication) has the permission to access a specific resource or perform a particular action within a system, essentially deciding what a user can do once their identity is confirmed; it’s about granting or denying access based on their assigned privileges
Which of the terms listed below applies to the authentication process?
a. MFA
b. MMC
c. MDM
d. MFD
** Answer: MFA **
Multi-factor authentication (MFA) is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint.
Which of the following answers refer to NIPS? (Select 3 answers)
a. Takes proactive measures to block or mitigate intrusion attempts.
b. Generates alerts and notifies security personnel or administrators when suspicious activity is detected.
c. Operates in an inline mode, actively intercepting and inspecting network traffic.
d. Monitors network traffic without direct involvement in traffic routing or packet modification.
e. Does not take direct action to block or prevent attacks.
f. It can drop or reject network packets, terminate connections, or take other actions to stop the attack.
** Answer: a, b, c, f **
A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
- Takes proactive measures to block or mitigate intrusion attempts.
- Generates alerts and notifies security personnel or administrators when suspicious activity is detected
- Operates in an inline mode, actively intercepting and inspecting network traffic
- It can drop or reject network packets, terminate connections, or take other actions to stop the attack
Which of the terms listed below refers to threat intelligence gathered from publicly available sources?
a. IoC
b. OSINT
c. RFC
d. CVE/NVD
** Answer: OSINT **
Open-Source Intelligence (OSINT) is a cyber security technique that involves gathering and analyzing publicly available information to help with security assessments and threat analysis. OSINT can be used to: Prevent cyber attacks, Disrupt criminal activities, Apprehend offenders, and Protect the public.
OSINT can be used by cyber defenders, law enforcement, and federal investigators.
Which of the following answers refers to a common PnP interface that allows a PC to communicate with peripherals and other devices?
a. IDE
b. PCIe
c. USB
d. eSATA
** Answer: USB **
In cybersecurity, “USB” refers to a Universal Serial Bus, which is a common connection point on computers that can be exploited by hackers to spread malware through removable drives like flash drives, making them a significant security concern due to the ease of transferring malicious code when a user plugs in an infected USB stick without caution; essentially acting as a vector for cyberattacks.