Security + 701 Flashcards

Passing Security + exam (45 cards)

1
Q

Which of the following is an example of a technical security control?

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of a VPN?

A

Provide secure remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack involves sending fraudulent emails that appear to be from a trusted source?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main function of a Network Access Control (NAC) system?

A

Enforce policies on devices before they connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following describes the process of hashing?

A

Ensuring data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between symmetric and asymmetric encryption?

A

Symmetric uses one key; asymmetric uses two keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is used to secure email communications?

A

S/MIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a honeypot?

A

Detect and deflect unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security principle ensures that only authorized users can access data?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user reports that their system has been infected by ransomware. What should be done first?

A

Disconnect the affected system from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware hides itself by altering system files?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless security protocol is the most secure?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a digital signature provide?

A

Integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which port does HTTPS typically use?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which tool is commonly used for vulnerability scanning?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which access control model uses labels to enforce security policies?

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a demilitarized zone (DMZ) in network security?

A

Separate public-facing services from internal networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is a physical security control?

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a DNS poisoning attack do?

A

Redirects users to malicious websites

20
Q

Which security framework focuses on continuous monitoring and risk assessment?

A

NIST Cybersecurity Framework

21
Q

What does a Certificate Authority (CA) do?

A

Issues and manages digital certificates

22
Q

Which term describes the process of identifying and reducing security risks?

A

Risk management

23
Q

What type of attack involves intercepting and altering communication between two parties?

A

Man-in-the-middle

24
Q

What is the purpose of a Security Information and Event Management (SIEM) system?

A

Centralize logging and analyze security events

25
Which protocol is used to securely transfer files over the internet?
FTPS
26
What does a network intrusion detection system (NIDS) do?
Detects and alerts on suspicious activity
27
Which of the following is an example of social engineering?
Phishing
28
What is the function of port 22?
SSH
29
Which RAID level provides both redundancy and performance improvement?
RAID 10
30
What type of malware replicates itself without user intervention?
Worm
31
Which of the following is a symmetric encryption algorithm?
AES
32
What type of attack exploits a vulnerability in dynamically generated SQL queries?
SQL injection
33
Which security control detects unauthorized changes to files?
HIDS (Host-Based Intrusion Detection System)
34
What is the primary purpose of a disaster recovery plan?
Restore business operations after a disaster
35
Which wireless attack involves capturing authentication packets to crack WPA/WPA2 keys?
WPA cracking
36
What is the purpose of a digital certificate?
Verify the identity of an entity
37
Which of the following uses public and private key pairs for encryption?
RSA
38
What is the purpose of a session key?
Encrypt data for a single communication session
39
What type of attack involves flooding a network with traffic to cause disruption?
DDoS (Distributed Denial of Service)
40
What tool is used to test network vulnerabilities by simulating attacks?
Metasploit
41
Which security policy ensures users only have the permissions needed for their job roles?
Least privilege
42
What is the primary purpose of hashing in cybersecurity?
Data integrity verification
43
What is an example of multifactor authentication (MFA)?
Password and SMS code
44
Which tool is used for password cracking?
Hashcat
45
What is the purpose of a sandbox in cybersecurity?
Isolate suspicious programs for analysis