Study question Group2 Flashcards

Security + SYO-601 (26 cards)

1
Q

What does the acronym SYO-501 stand for?

A

CompTIA Security+ SY0-501

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: The SYO-501 exam focuses solely on technical skills.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a key objective of the SYO-501 exam? (A) Risk management (B) Web development (C) Database design

A

A) Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: The __________ model is commonly used to understand the layers of security in a network.

A

CIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary purpose of a firewall?

A

To control incoming and outgoing network traffic based on predetermined security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: Social engineering attacks rely on exploiting human psychology.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a type of malware? (A) Virus (B) Worm (C) Firewall

A

C) Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the term ‘phishing’ refer to?

A

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiple choice: What is the purpose of encryption? (A) To speed up data processing (B) To protect data confidentiality (C) To improve data access speed

A

B) To protect data confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Intrusion Detection System (IDS)?

A

A device or software application that monitors network or system activities for malicious activities or policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: A VPN provides a secure connection over the internet.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: __________ is the process of verifying the identity of a user or device.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which security principle involves the least amount of privilege necessary for users? (A) Least Privilege (B) Maximum Privilege (C) Total Control

A

A) Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the term ‘DDoS’ stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple choice: Which of the following is a common type of authentication? (A) Password (B) IP address (C) MAC address

A

A) Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main goal of penetration testing?

A

To identify vulnerabilities in a system before they can be exploited by attackers.

17
Q

True or False: Two-factor authentication adds an extra layer of security beyond just a password.

18
Q

Fill in the blank: __________ is the act of taking unauthorized control of a computer system.

19
Q

Which of the following is a risk associated with cloud computing? (A) Increased accessibility (B) Data breaches (C) Cost savings

A

B) Data breaches

20
Q

What does ‘patch management’ involve?

A

The process of managing updates for software applications and technologies.

21
Q

Multiple choice: Which of the following is a type of physical security control? (A) Firewalls (B) Security cameras (C) Antivirus software

A

B) Security cameras

22
Q

True or False: A security policy outlines the rules and procedures for maintaining security within an organization.

23
Q

What is the primary function of an antivirus program?

A

To detect and remove malicious software from computers and networks.

24
Q

Fill in the blank: __________ refers to the practice of monitoring and analyzing network traffic for suspicious activity.

A

Network security monitoring

25
Which of the following best describes a 'zero-day' vulnerability?
A security flaw that is unknown to the vendor and for which no patch has been released.
26
Multiple choice: What is the primary purpose of a security audit? (A) To assess compliance with security policies (B) To improve system performance (C) To enhance user experience
A) To assess compliance with security policies