100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Comptia Security Question and answers 2023 verified to pass £10.55   Add to cart

Exam (elaborations)

Comptia Security Question and answers 2023 verified to pass

 1 view  0 purchase

Comptia Security Question and answers 2023 verified to pass

Preview 2 out of 8  pages

  • October 18, 2023
  • 8
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (2020)
avatar-seller
Carzola98
Comptia Security+ - Chapter 1 Quiz -
Mastering Security Basics
1. Homer needs to send an email to his HR department with an attachment that
includes PII. He wants
to maintain the confidentiality of this attachment. Which of the following choices is the
BEST choice
to meet his needs?
A. Hashing
B. Digital signature
C. Encryption
D. Certificate - correct answer C. Encryption is the best choice to provide
confidentiality of any type of information, including
Personally Identifiable Information (PII). Hashing, digital signatures, and certificates all
provide
integrity, not confidentiality.

You want to ensure that messages sent from administrators to managers arrive
unchanged. Which
security goal are you addressing?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication - correct answer B. Integrity provides assurances that data has not
been modified, and integrity is commonly
enforced with hashing. Confidentiality prevents unauthorized disclosure of data but
doesn't address
modifications of data. Availability ensures systems are up and operational when needed
and uses fault
tolerance and redundancy methods. Authentication provides proof that users are who
they claim to be.

Your organization recently implemented two servers that act as failover devices for each
other.
Which security goal is your organization pursuing?
A. Safety
B. Integrity
C. Confidentiality
D. Availability - correct answer D. Your organization is pursuing availability. A failover
cluster uses redundant servers to ensure a
service will continue to operate even if one of the servers fail. Safety methods provide
safety for
personnel and other assets. Integrity methods ensure that data has not been modified.
Confidentiality

, methods such as encryption prevent the unauthorized disclosure of data.

Management at your company recently decided to implement additional lighting and
fencing around
the property. Which security goal is your company MOST likely pursuing?
A. Confidentiality
B. Integrity
C. Availability
D. Safety - correct answer D. Lighting and fencing are two methods that can enhance
the security goal of safety.
Confidentiality is enhanced with encryption and access controls. Integrity is enhanced
with hashing,
certificates, and digital signatures. Availability is enhanced with redundancy and fault-
tolerance
procedures.

You are logging on to your bank's web site using your email address and a password.
What is the
purpose of the email address in this example?
A. Identification
B. Authentication
C. Authorization
D. Availability - correct answer A. The email address provides identification for you
and your account. The password combined
with the email address provides authentication, proving who you are. Based on your
identity, you are
granted authorization to view your account details. Availability is unrelated to
identification,
authentication, and authorization.

Your organization has a password policy with a password history value of 12. What
does this
indicate?
A. Your password must be at least 12 characters long.
B. Twelve different passwords must be used before reusing the same password.
C. Passwords must be changed every 12 days.
D. Passwords cannot be changed until 12 days have passed. - correct answer B. The
password history indicates how many passwords a system remembers and how many
different passwords must be used before a password can be reused. Password length
identifies the
minimum number of characters. Password maximum age identifies when users must
change
passwords. Password minimum age identifies the length of time that must pass before
users can
change a password again.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Carzola98. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £10.55. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£10.55
  • (0)
  Add to cart