Security + 701 Flashcards
Passing Security + exam
Which of the following is an example of a technical security control?
Firewalls
What is the primary purpose of a VPN?
Provide secure remote access
Which attack involves sending fraudulent emails that appear to be from a trusted source?
Phishing
What is the main function of a Network Access Control (NAC) system?
Enforce policies on devices before they connect to the network
Which of the following describes the process of hashing?
Ensuring data integrity
What is the difference between symmetric and asymmetric encryption?
Symmetric uses one key; asymmetric uses two keys
Which protocol is used to secure email communications?
S/MIME
What is the purpose of a honeypot?
Detect and deflect unauthorized access
Which security principle ensures that only authorized users can access data?
Confidentiality
A user reports that their system has been infected by ransomware. What should be done first?
Disconnect the affected system from the network
What type of malware hides itself by altering system files?
Rootkit
Which wireless security protocol is the most secure?
WPA3
What does a digital signature provide?
Integrity and authentication
Which port does HTTPS typically use?
443
Which tool is commonly used for vulnerability scanning?
Nessus
Which access control model uses labels to enforce security policies?
Mandatory Access Control (MAC)
What is the purpose of a demilitarized zone (DMZ) in network security?
Separate public-facing services from internal networks
Which of the following is a physical security control?
Biometrics