Comptia Security Plus Flashcards

(72 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the acronym CIA stand for in cybersecurity?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: A firewall is a device that monitors and controls incoming and outgoing network traffic.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: The process of converting plaintext into ciphertext is called __________.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack involves overwhelming a system with traffic to make it unavailable?

A

Denial of Service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main purpose of a VPN?

A

To create a secure connection over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a common malware type? A) Virus B) Firewall C) Router

A

A) Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

Manipulating individuals to divulge confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Multi-factor authentication requires two or more verification methods.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term ‘phishing’ refer to?

A

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is commonly used for secure data transmission over the internet?

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of an Intrusion Detection System (IDS)?

A

To monitor network traffic for suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fill in the blank: A __________ is a software or hardware tool used to filter traffic based on predetermined security rules.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the term ‘zero-day vulnerability’ mean?

A

A flaw in software that is unknown to the vendor and has no patch available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Encryption is only necessary for data at rest.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary purpose of an SSL certificate?

A

To secure data transmitted over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does DLP stand for in cybersecurity?

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is NOT a type of malware? A) Trojan B) Worm C) Router

A

C) Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the principle of least privilege?

A

Users should have the minimum level of access necessary to perform their job functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: __________ is the practice of regularly updating software to fix vulnerabilities.

A

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a common method of protecting against unauthorized access to a network?

A

Using strong passwords and changing them regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False: A man-in-the-middle attack occurs when an attacker secretly relays and possibly alters communication between two parties.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of a security policy?

A

To establish guidelines for protecting an organization’s assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the acronym SIEM stand for?

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which type of attack uses multiple compromised systems to launch a coordinated attack on a target?
Distributed Denial of Service (DDoS) attack
26
Fill in the blank: __________ is the process of verifying the identity of a user or device.
Authentication
27
What is the role of a digital certificate?
To verify the ownership of a public key
28
True or False: Regularly backing up data is an important part of a disaster recovery plan.
True
29
What does Ransomware do?
Encrypts files and demands payment for the decryption key
30
What is the main goal of penetration testing?
To identify and exploit vulnerabilities in a system
31
Fill in the blank: __________ is the unauthorized access and use of a computer system.
Hacking
32
What is the purpose of a vulnerability assessment?
To identify, quantify, and prioritize vulnerabilities in a system
33
True or False: Security awareness training is only necessary for IT staff.
False
34
What does the acronym MFA stand for?
Multi-Factor Authentication
35
Which of the following is a strong password? A) password123 B) 3z7!X@pQ C) 123456
B) 3z7!X@pQ
36
What is the primary purpose of an endpoint security solution?
To protect endpoints like computers and mobile devices from threats
37
Fill in the blank: __________ is the act of attempting to gain unauthorized access to a system or network.
Hacking
38
What does the term 'vulnerability' refer to?
A weakness in a system that can be exploited by a threat actor
39
True or False: Strong encryption can prevent unauthorized access to data.
True
40
What is a security incident response plan?
A documented plan for responding to security breaches or incidents
41
What does the term 'insider threat' mean?
A security risk that originates from within the organization
42
Fill in the blank: __________ is a type of attack where an attacker tries to guess a password through trial and error.
Brute force attack
43
What is the purpose of a security audit?
To evaluate the effectiveness of an organization's security measures
44
True or False: Encryption keys should be stored in the same location as the encrypted data.
False
45
What is the main function of a proxy server?
To act as an intermediary between a user's device and the internet
46
What does the acronym IDS stand for?
Intrusion Detection System
47
Fill in the blank: __________ is the process of recovering data after a data loss incident.
Data recovery
48
What is a common consequence of a data breach?
Loss of sensitive information and potential financial loss
49
True or False: The principle of defense in depth involves using multiple layers of security controls.
True
50
What does the term 'malware' encompass?
Malicious software designed to harm or exploit any programmable device
51
What is the primary goal of a risk assessment?
To identify and evaluate potential risks to an organization's assets
52
Fill in the blank: __________ is an approach to security that involves identifying and mitigating risks.
Risk management
53
What is the purpose of an access control list (ACL)?
To define who can access specific resources in a network
54
True or False: All security incidents must be reported to management.
True
55
What does the acronym BYOD stand for?
Bring Your Own Device
56
What is the purpose of an antivirus program?
To detect and remove malicious software from a computer
57
Fill in the blank: __________ is the unauthorized interception of data during transmission.
Eavesdropping
58
What is the function of a security token?
To provide a means of authentication for a user
59
True or False: A strong security posture helps to minimize the risk of data breaches.
True
60
What does the term 'data breach' refer to?
An incident where unauthorized access to sensitive data occurs
61
What is the purpose of a firewall rule?
To determine what traffic is allowed or denied through the firewall
62
Fill in the blank: __________ is a technique used to protect network traffic by disguising it.
Tunneling
63
What is the main benefit of using a cloud security solution?
Scalability and flexibility in managing security resources
64
True or False: All users should have the same level of access to sensitive data.
False
65
What does the acronym SOC stand for in cybersecurity?
Security Operations Center
66
What is the role of a security researcher?
To identify and analyze security vulnerabilities and threats
67
Fill in the blank: __________ is the practice of securing a network by segmenting it into smaller parts.
Network segmentation
68
What is the purpose of a password manager?
To securely store and manage passwords for various accounts
69
True or False: Physical security is not a concern for cybersecurity professionals.
False
70
What does the term 'data integrity' mean?
The accuracy and consistency of data over its lifecycle
71
What is a common method of preventing unauthorized access to a network?
Implementing strong authentication measures
72
Fill in the blank: __________ is the act of monitoring network traffic for suspicious activity.
Traffic analysis