Security + 701 Flashcards

Passing Security + exam

1
Q

Which of the following is an example of a technical security control?

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of a VPN?

A

Provide secure remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack involves sending fraudulent emails that appear to be from a trusted source?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main function of a Network Access Control (NAC) system?

A

Enforce policies on devices before they connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following describes the process of hashing?

A

Ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric uses one key; asymmetric uses two keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is used to secure email communications?

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a honeypot?

A

Detect and deflect unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security principle ensures that only authorized users can access data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user reports that their system has been infected by ransomware. What should be done first?

A

Disconnect the affected system from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware hides itself by altering system files?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless security protocol is the most secure?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a digital signature provide?

A

Integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which port does HTTPS typically use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which tool is commonly used for vulnerability scanning?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which access control model uses labels to enforce security policies?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a demilitarized zone (DMZ) in network security?

A

Separate public-facing services from internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is a physical security control?

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a DNS poisoning attack do?

A

Redirects users to malicious websites

20
Q

Which security framework focuses on continuous monitoring and risk assessment?

A

NIST Cybersecurity Framework

21
Q

What does a Certificate Authority (CA) do?

A

Issues and manages digital certificates

22
Q

Which term describes the process of identifying and reducing security risks?

A

Risk management

23
Q

What type of attack involves intercepting and altering communication between two parties?

A

Man-in-the-middle

24
Q

What is the purpose of a Security Information and Event Management (SIEM) system?

A

Centralize logging and analyze security events

25
Q

Which protocol is used to securely transfer files over the internet?

A

FTPS

26
Q

What does a network intrusion detection system (NIDS) do?

A

Detects and alerts on suspicious activity

27
Q

Which of the following is an example of social engineering?

A

Phishing

28
Q

What is the function of port 22?

A

SSH

29
Q

Which RAID level provides both redundancy and performance improvement?

A

RAID 10

30
Q

What type of malware replicates itself without user intervention?

A

Worm

31
Q

Which of the following is a symmetric encryption algorithm?

A

AES

32
Q

What type of attack exploits a vulnerability in dynamically generated SQL queries?

A

SQL injection

33
Q

Which security control detects unauthorized changes to files?

A

HIDS (Host-Based Intrusion Detection System)

34
Q

What is the primary purpose of a disaster recovery plan?

A

Restore business operations after a disaster

35
Q

Which wireless attack involves capturing authentication packets to crack WPA/WPA2 keys?

A

WPA cracking

36
Q

What is the purpose of a digital certificate?

A

Verify the identity of an entity

37
Q

Which of the following uses public and private key pairs for encryption?

A

RSA

38
Q

What is the purpose of a session key?

A

Encrypt data for a single communication session

39
Q

What type of attack involves flooding a network with traffic to cause disruption?

A

DDoS (Distributed Denial of Service)

40
Q

What tool is used to test network vulnerabilities by simulating attacks?

A

Metasploit

41
Q

Which security policy ensures users only have the permissions needed for their job roles?

A

Least privilege

42
Q

What is the primary purpose of hashing in cybersecurity?

A

Data integrity verification

43
Q

What is an example of multifactor authentication (MFA)?

A

Password and SMS code

44
Q

Which tool is used for password cracking?

A

Hashcat

45
Q

What is the purpose of a sandbox in cybersecurity?

A

Isolate suspicious programs for analysis