Security + 701 Flashcards
Passing Security + exam
Which of the following is an example of a technical security control?
Firewalls
What is the primary purpose of a VPN?
Provide secure remote access
Which attack involves sending fraudulent emails that appear to be from a trusted source?
Phishing
What is the main function of a Network Access Control (NAC) system?
Enforce policies on devices before they connect to the network
Which of the following describes the process of hashing?
Ensuring data integrity
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses two keys
Which protocol is used to secure email communications?
S/MIME
What is the purpose of a honeypot?
Detect and deflect unauthorized access
Which security principle ensures that only authorized users can access data?
Confidentiality
A user reports that their system has been infected by ransomware. What should be done first?
Disconnect the affected system from the network
What type of malware hides itself by altering system files?
Rootkit
Which wireless security protocol is the most secure?
WPA3
What does a digital signature provide?
Integrity and authentication
Which port does HTTPS typically use?
443
Which tool is commonly used for vulnerability scanning?
Nessus
Which access control model uses labels to enforce security policies?
Mandatory Access Control (MAC)
What is the purpose of a demilitarized zone (DMZ) in network security?
Separate public-facing services from internal networks
Which of the following is a physical security control?
Biometrics
What does a DNS poisoning attack do?
Redirects users to malicious websites
Which security framework focuses on continuous monitoring and risk assessment?
NIST Cybersecurity Framework
What does a Certificate Authority (CA) do?
Issues and manages digital certificates
Which term describes the process of identifying and reducing security risks?
Risk management
What type of attack involves intercepting and altering communication between two parties?
Man-in-the-middle
What is the purpose of a Security Information and Event Management (SIEM) system?
Centralize logging and analyze security events
Which protocol is used to securely transfer files over the internet?
FTPS
What does a network intrusion detection system (NIDS) do?
Detects and alerts on suspicious activity
Which of the following is an example of social engineering?
Phishing
What is the function of port 22?
SSH
Which RAID level provides both redundancy and performance improvement?
RAID 10
What type of malware replicates itself without user intervention?
Worm
Which of the following is a symmetric encryption algorithm?
AES
What type of attack exploits a vulnerability in dynamically generated SQL queries?
SQL injection
Which security control detects unauthorized changes to files?
HIDS (Host-Based Intrusion Detection System)
What is the primary purpose of a disaster recovery plan?
Restore business operations after a disaster
Which wireless attack involves capturing authentication packets to crack WPA/WPA2 keys?
WPA cracking
What is the purpose of a digital certificate?
Verify the identity of an entity
Which of the following uses public and private key pairs for encryption?
RSA
What is the purpose of a session key?
Encrypt data for a single communication session
What type of attack involves flooding a network with traffic to cause disruption?
DDoS (Distributed Denial of Service)
What tool is used to test network vulnerabilities by simulating attacks?
Metasploit
Which security policy ensures users only have the permissions needed for their job roles?
Least privilege
What is the primary purpose of hashing in cybersecurity?
Data integrity verification
What is an example of multifactor authentication (MFA)?
Password and SMS code
Which tool is used for password cracking?
Hashcat
What is the purpose of a sandbox in cybersecurity?
Isolate suspicious programs for analysis