100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA SEC+ Exam Questions With Correct Answers

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
17-08-2024
Written in
2024/2025

CompTIA SEC+ Exam Questions With Correct Answers AAA - answerA group of technologies used in remote access systems. ____verifies a user's identification. ___ determines if a user should have access. ___ tracks a user's access with logs. Sometimes called AAAs of security. ACL (Access Control List) - answerA set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access/permissions to a resource such as a computer, file, or network. (R,W,X, Delete) AES (Advanced Encryption Standard) - answerA strong symmetric block cipher that encrypts data in 128-bit blocks. ____ can use key sizes of 128 bits, 192 bits, or 256 bits. Replaced DES. AH (Authentication Header) - answerAn IPSec protocol that provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks. AI (artificial intelligence) - answersimulates human thinking and behavior, such as the ability to reason and learn. Its ultimate goal is to build a system that can mimic human intelligence. (AIS)Automated Indicator Sharing - answerAn initiative from the US DHS that enables the exchange of cybersecurity threat indicators. ALE (Annual Loss Expectancy) - answerThe total cost of a risk to an organization on an annual basis. This is determined by multiplying the single loss expectancy (SLE) by the annual rate of occurrence (ARO). ALE = SLE*ARO AP (Access Point) - answerA device that provides a connection between wireless devices and can connect to wired networks. Also known as wireless access point or WAP. API (Application Programming Interface) - answerA library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system. EXAM STUDY MATERIALS 8/7/2024 11:29 AM APT (Advanced Persistent Threat) - answerA threat that is rooted in the capability to infiltrate a network and remain inside while going undetected. Usual aim is for more targeted and strategic objectives. ARO (Annualized Rate of Occurrence) - answerthe likelihood of an event occurring within a year Calculated by / number of failures into the number of years between failures. Ex: 1 failure in 5 years (1/5 = .20) or 20% ARP (Address Resolution Protocol) - answerA communications protocol that resolves IP addresses to MAC addresses. ASLR (Address Space Layout Randomization) - answerA technique that randomizes where components in a running application are placed in memory to protect against buffer overflows. ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) - answerA knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and procedures. AUP (Acceptable Use Policy) - answerDefines what action employees may or may not preform on company equipment, including computers, phones, printers, and even the network itself. This policy defines the handling of passwords, e-mail, and many other issues. AV (AntiVirus) - answerSoftware program used to protect the user environment that scans for downloadable malicious code. Typically uses signature-based detection, and not effective against zero-days or polymorphic malware. bash (Bourne again shell) - answerPowerful UNIX/LINUX shell and command language Used to issue commands that get executed, which can also be turned into shell scripts Often used for automation BCP (Business Continuity Plan) - answerthe plans we put in place to ensure that critical business functions can continue operations in the event of an emergency BGP (Border Gateway Protocol) - answerDubbed the "protocol of the Internet," this path- vector routing protocol is the only current EGP and is capable of considering many factors in its routing metrics. EXAM STUDY MATERIALS 8/7/2024 11:29 AM BIA (Business Impact Analysis) - answerIdentifies critical business or mission requirements and includes elements such as Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), but it doesn't identify solutions. BIOS (basic input/output system) - answerFirmware that can control much of a computer's input/output functions, such as communication with the keyboard and the monitor. BPA (Business Partners Agreement) - answerAn agreement between partners in a business that outlines their responsibilities, obligations, and sharing of profits and losses. BPDU (Bridge Protocol Data Unit) - answerthe data message exchanged by switches participating in the Spanning Tree Protocol. BYOD (bring your own device) - answerThe practice of allowing users to use their own personal devices to connect to an organizational network. CA (Certificate Authority) - answerA server that can issue digital certificates and the associated public/private key pairs. A primary component of PKI. CAR (Corrective Action Report) - answerA report used to document actions taken to correct an event, incident, or outage. CASB (Cloud Access Security Broker) - answerA software tool or service that enforces cloud-based security requirements. It is placed bet

Show more Read less
Institution
CompTIA
Course
CompTIA

Content preview

EXAM STUDY MATERIALS 8/7/2024 11:29 AM




CompTIA SEC+ Exam Questions With
Correct Answers

AAA - answer✔✔A group of technologies used in remote access systems. ____verifies a user's
identification. ___ determines if a user should have access. ___ tracks a user's access with logs.
Sometimes called AAAs of security.

ACL (Access Control List) - answer✔✔A set of data (user names, passwords, time and date, IP
address, MAC address, etc.) that is used to control access/permissions to a resource such as a
computer, file, or network. (R,W,X, Delete)

AES (Advanced Encryption Standard) - answer✔✔A strong symmetric block cipher that
encrypts data in 128-bit blocks. ____ can use key sizes of 128 bits, 192 bits, or 256 bits.
Replaced DES.

AH (Authentication Header) - answer✔✔An IPSec protocol that provides authentication for the
origin of transmitted data as well as integrity and protection against replay attacks.

AI (artificial intelligence) - answer✔✔simulates human thinking and behavior, such as the
ability to reason and learn. Its ultimate goal is to build a system that can mimic human
intelligence.

(AIS)Automated Indicator Sharing - answer✔✔An initiative from the US DHS that enables the
exchange of cybersecurity threat indicators.

ALE (Annual Loss Expectancy) - answer✔✔The total cost of a risk to an organization on an
annual basis. This is determined by multiplying the single loss expectancy (SLE) by the annual
rate of occurrence (ARO).
ALE = SLE*ARO

AP (Access Point) - answer✔✔A device that provides a connection between wireless devices
and can connect to wired networks. Also known as wireless access point or WAP.

API (Application Programming Interface) - answer✔✔A library of programming utilities used,
for example, to enable software developers to access functions of the TCP/IP network stack
under a particular operating system.

, EXAM STUDY MATERIALS 8/7/2024 11:29 AM

APT (Advanced Persistent Threat) - answer✔✔A threat that is rooted in the capability to
infiltrate a network and remain inside while going undetected. Usual aim is for more targeted and
strategic objectives.

ARO (Annualized Rate of Occurrence) - answer✔✔the likelihood of an event occurring within a
year
Calculated by / number of failures into the number of years between failures.


Ex: 1 failure in 5 years (1/5 = .20) or 20%

ARP (Address Resolution Protocol) - answer✔✔A communications protocol that resolves IP
addresses to MAC addresses.

ASLR (Address Space Layout Randomization) - answer✔✔A technique that randomizes where
components in a running application are placed in memory to protect against buffer overflows.

ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) - answer✔✔A
knowledge base maintained by the MITRE Corporation for listing and explaining specific
adversary tactics, techniques, and procedures.

AUP (Acceptable Use Policy) - answer✔✔Defines what action employees may or may not
preform on company equipment, including computers, phones, printers, and even the network
itself. This policy defines the handling of passwords, e-mail, and many other issues.

AV (AntiVirus) - answer✔✔Software program used to protect the user environment that scans
for downloadable malicious code.
Typically uses signature-based detection, and not effective against zero-days or polymorphic
malware.

bash (Bourne again shell) - answer✔✔Powerful UNIX/LINUX shell and command language
Used to issue commands that get executed, which can also be turned into shell scripts
Often used for automation

BCP (Business Continuity Plan) - answer✔✔the plans we put in place to ensure that critical
business functions can continue operations in the event of an emergency

BGP (Border Gateway Protocol) - answer✔✔Dubbed the "protocol of the Internet," this path-
vector routing protocol is the only current EGP and is capable of considering many factors in its
routing metrics.

, EXAM STUDY MATERIALS 8/7/2024 11:29 AM

BIA (Business Impact Analysis) - answer✔✔Identifies critical business or mission requirements
and includes elements such as Recovery Time Objectives (RTOs) and Recovery Point Objectives
(RPOs), but it doesn't identify solutions.

BIOS (basic input/output system) - answer✔✔Firmware that can control much of a computer's
input/output functions, such as communication with the keyboard and the monitor.

BPA (Business Partners Agreement) - answer✔✔An agreement between partners in a business
that outlines their responsibilities, obligations, and sharing of profits and losses.

BPDU (Bridge Protocol Data Unit) - answer✔✔the data message exchanged by switches
participating in the Spanning Tree Protocol.

BYOD (bring your own device) - answer✔✔The practice of allowing users to use their own
personal devices to connect to an organizational network.

CA (Certificate Authority) - answer✔✔A server that can issue digital certificates and the
associated public/private key pairs. A primary component of PKI.

CAR (Corrective Action Report) - answer✔✔A report used to document actions taken to correct
an event, incident, or outage.

CASB (Cloud Access Security Broker) - answer✔✔A software tool or service that enforces
cloud-based security requirements. It is placed between the organization's resources and the
cloud, monitors all network traffic, and can enforce security policies.

CBC (Cipher Block Chaining) - answer✔✔Encryption technique where each plaintext block is
XORed with the previous cipher text block. Performs a different set of input and output to the
data to add some randomization.
Provides confidentiality ONLY not integrity.

CCMP (Counter Mode CBC-MAC Protocol) - answer✔✔WPA2 security protocol based on AES
encryption

CCTV - answer✔✔This is a detective control that provides video surveillance. Video
surveillance provides reliable proof of a person's location and activity. It can be used by an
organization to verify if any equipment or data is being removed.

CERT (Computer Emergency Response Team) - answer✔✔A group of people integrated at the
enterprise with clear lines of reporting and responsibilities for standby support in case of an
information systems emergency. This group will act as an efficient corrective control, and should
also act as a single point of contact for all incidents and issues related to information systems.

CHAP (Challenge Handshake Authentication Protocol) - answer✔✔Common remote access
protocol authentication method; the serving system challenges the remote client, usually by
means of asking for a password. (The hash is transmitted)

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
August 17, 2024
Number of pages
22
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brightstars Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
218
Member since
1 year
Number of followers
7
Documents
12914
Last sold
3 days ago
VERIFIED EXAMS AND STUDY GUIDES.

Here, you will find Study Notes, Exam answer packs 100% Guarenteed success.

3.2

33 reviews

5
10
4
4
3
8
2
3
1
8

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions