100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CompTIA Security+ Percipio Study Guide 100% Correct Answers Verified Latest 2024 Version $10.99   Add to cart

Exam (elaborations)

CompTIA Security+ Percipio Study Guide 100% Correct Answers Verified Latest 2024 Version

 0 view  0 purchase
  • Course
  • Institution

What would a secret formula for a medicine classify as? A) Private B) Public C) Confidential D) Proprietary - D) Proprietary It is YOUR formula that YOU own, so it is YOUR property. Which of the following are used to measure integrity of an application? (Select all that apply) A) Quality B)...

[Show more]

Preview 4 out of 91  pages

  • July 2, 2024
  • 91
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
CompTIA Security+ Percipio Study Guide |
100% Correct Answers | Verified | Latest
2024 Version
What would a secret formula for a medicine classify as?



A) Private

B) Public

C) Confidential

D) Proprietary - ✔✔D) Proprietary



It is YOUR formula that YOU own, so it is YOUR property.



Which of the following are used to measure integrity of an application? (Select all that apply)



A) Quality

B) Confidentiality

C) Maintainability

D) Reliability - ✔✔All of them are used (A,B,C,D)



In which of the following situations, creating a manual snapshot of an operating system is
recommended?



A) Before updates or major system changes

B) During security configuration

C) After an update or a major system change

D) Periodically at various times - ✔✔A) Before updates or major system changes

,This allows you to back up in case of failures



You have recently formatted your system after detecting a remote access trojan (RAT). You want to
ensure that the RAT is no longer able to get into your system. Which of the following methods should
you use? (Select all that apply)



A) Keep the antivirus up to date

B) Avoid downloading unknown programs

C) Avoid opening e-mail attachments from unknown senders

D) Block unused ports and shut down unwanted services

E) Monitor outgoing traffic regularly - ✔✔All of them (A, B, C, D, E) are standard information security
practices.



An internal user has been able to gain access to another user's internal Website password and logged to
his account. How would you classify this event as?



A) Event Anomaly

B) Security Misconfiguration

C) Access Violation

D) Invalid Login attempt - ✔✔C) Access Violation



The user is using another person's credentials to access the internal website. You should NEVER give your
password out to anyone (or use someone else's credentials).



As part of a recovery drill, an organization decides to move to a warm site, until the primary location is
back in action. Which of the following business continuity plan is performed here?



A) Alternate business process

B) Tabletop exercise

C) Failover

D) Location selection - ✔✔C) Failover

,Failover is a process of switching over to another option when the primary option becomes unavailable.



The IT helpdesk has been receiving complaints that when they connect their laptops through the Wi-Fi
connection, they are not able to access the organizational network. However, they can access the
Internet. On conducting a security scan, the IT helpdesk engineer notices that the users are being routed
to an access point that has not been installed by the organization.

Which of the following wireless attack does this scenario depict?



A) Jamming

B) Rogue AP

C) Packet sniffing

D) Evil Twin - ✔✔B) Rogue AP



Rouge Access Point (Rouge AP) is a wireless threat that bypasses all wired security measures (firewalls,
for example) by providing access to a wired enterprise network. Rogue access points could potentially
allow unchallenged access to the network by any wireless user or client in the physical vicinity.



You need to configure an encrypted E-mail for users within the network. The E-mail must be in its secure
form so that it is not transmitted in the clear-text form using a messaging client. What should you do?



A) Use the S/MIME protocol

B) Install SSL/TLS certificates on the messaging server

C) Configure HTTPS

D) Install the SSL/TLS certificate on all user systems - ✔✔A) Use the S/MIME protocol



S/MIME (Secure/Multipurpose Internet Mail Extensions) Is used to encrypt emails at client side. S/MIME
is a standard for public key encryption and signing of MIME data.



Which of the following security protocol is used by EAP-FAST?

, A) Kerberos

B) RADIUS

C) Transport Layer Security (TLS)

D) Diameter - ✔✔C) Transport Layer Security (TLS)



FAST (Flexible Authentication via Secure Tunneling) uses TLS to perform authentication.



A forensic expert finds a hidden encrypted file that is useful for legal proceedings. Which of the following
actions is performed by the expert here?



A) Collecting the evidence

B) Recovery of the evidence

C) Keeping legal hold of the evidence

D) Preservation of the evidence - ✔✔B) Recovery of the evidence



Which of the following can help to identify a computer hoax?



A) Circuit-level gateways

B) Packet-filtering firewall

C) Application-level gateways

D) Spam filter - ✔✔D) Spam filter



Common spam filters will identify and help prevent hoaxes



Which of the following devices are likely to implement home automation?



A) IoT

B) Windows Embedded Compact

C) RTOS

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller hussle. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72349 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart