CompTIA SEC+ Exam Questions With
Correct Answers
AAA - answerA group of technologies used in remote access systems. ____verifies a user's
identification. ___ determines if a user should have access. ___ tracks a user's access with logs.
Sometimes called AAAs of security.
ACL (Access Control Li...
AAA - answer✔✔A group of technologies used in remote access systems. ____verifies a user's
identification. ___ determines if a user should have access. ___ tracks a user's access with logs.
Sometimes called AAAs of security.
ACL (Access Control List) - answer✔✔A set of data (user names, passwords, time and date, IP
address, MAC address, etc.) that is used to control access/permissions to a resource such as a
computer, file, or network. (R,W,X, Delete)
AES (Advanced Encryption Standard) - answer✔✔A strong symmetric block cipher that
encrypts data in 128-bit blocks. ____ can use key sizes of 128 bits, 192 bits, or 256 bits.
Replaced DES.
AH (Authentication Header) - answer✔✔An IPSec protocol that provides authentication for the
origin of transmitted data as well as integrity and protection against replay attacks.
AI (artificial intelligence) - answer✔✔simulates human thinking and behavior, such as the
ability to reason and learn. Its ultimate goal is to build a system that can mimic human
intelligence.
(AIS)Automated Indicator Sharing - answer✔✔An initiative from the US DHS that enables the
exchange of cybersecurity threat indicators.
ALE (Annual Loss Expectancy) - answer✔✔The total cost of a risk to an organization on an
annual basis. This is determined by multiplying the single loss expectancy (SLE) by the annual
rate of occurrence (ARO).
ALE = SLE*ARO
AP (Access Point) - answer✔✔A device that provides a connection between wireless devices
and can connect to wired networks. Also known as wireless access point or WAP.
API (Application Programming Interface) - answer✔✔A library of programming utilities used,
for example, to enable software developers to access functions of the TCP/IP network stack
under a particular operating system.
, EXAM STUDY MATERIALS 8/7/2024 11:29 AM
APT (Advanced Persistent Threat) - answer✔✔A threat that is rooted in the capability to
infiltrate a network and remain inside while going undetected. Usual aim is for more targeted and
strategic objectives.
ARO (Annualized Rate of Occurrence) - answer✔✔the likelihood of an event occurring within a
year
Calculated by / number of failures into the number of years between failures.
Ex: 1 failure in 5 years (1/5 = .20) or 20%
ARP (Address Resolution Protocol) - answer✔✔A communications protocol that resolves IP
addresses to MAC addresses.
ASLR (Address Space Layout Randomization) - answer✔✔A technique that randomizes where
components in a running application are placed in memory to protect against buffer overflows.
ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) - answer✔✔A
knowledge base maintained by the MITRE Corporation for listing and explaining specific
adversary tactics, techniques, and procedures.
AUP (Acceptable Use Policy) - answer✔✔Defines what action employees may or may not
preform on company equipment, including computers, phones, printers, and even the network
itself. This policy defines the handling of passwords, e-mail, and many other issues.
AV (AntiVirus) - answer✔✔Software program used to protect the user environment that scans
for downloadable malicious code.
Typically uses signature-based detection, and not effective against zero-days or polymorphic
malware.
bash (Bourne again shell) - answer✔✔Powerful UNIX/LINUX shell and command language
Used to issue commands that get executed, which can also be turned into shell scripts
Often used for automation
BCP (Business Continuity Plan) - answer✔✔the plans we put in place to ensure that critical
business functions can continue operations in the event of an emergency
BGP (Border Gateway Protocol) - answer✔✔Dubbed the "protocol of the Internet," this path-
vector routing protocol is the only current EGP and is capable of considering many factors in its
routing metrics.
, EXAM STUDY MATERIALS 8/7/2024 11:29 AM
BIA (Business Impact Analysis) - answer✔✔Identifies critical business or mission requirements
and includes elements such as Recovery Time Objectives (RTOs) and Recovery Point Objectives
(RPOs), but it doesn't identify solutions.
BIOS (basic input/output system) - answer✔✔Firmware that can control much of a computer's
input/output functions, such as communication with the keyboard and the monitor.
BPA (Business Partners Agreement) - answer✔✔An agreement between partners in a business
that outlines their responsibilities, obligations, and sharing of profits and losses.
BPDU (Bridge Protocol Data Unit) - answer✔✔the data message exchanged by switches
participating in the Spanning Tree Protocol.
BYOD (bring your own device) - answer✔✔The practice of allowing users to use their own
personal devices to connect to an organizational network.
CA (Certificate Authority) - answer✔✔A server that can issue digital certificates and the
associated public/private key pairs. A primary component of PKI.
CAR (Corrective Action Report) - answer✔✔A report used to document actions taken to correct
an event, incident, or outage.
CASB (Cloud Access Security Broker) - answer✔✔A software tool or service that enforces
cloud-based security requirements. It is placed between the organization's resources and the
cloud, monitors all network traffic, and can enforce security policies.
CBC (Cipher Block Chaining) - answer✔✔Encryption technique where each plaintext block is
XORed with the previous cipher text block. Performs a different set of input and output to the
data to add some randomization.
Provides confidentiality ONLY not integrity.
CCMP (Counter Mode CBC-MAC Protocol) - answer✔✔WPA2 security protocol based on AES
encryption
CCTV - answer✔✔This is a detective control that provides video surveillance. Video
surveillance provides reliable proof of a person's location and activity. It can be used by an
organization to verify if any equipment or data is being removed.
CERT (Computer Emergency Response Team) - answer✔✔A group of people integrated at the
enterprise with clear lines of reporting and responsibilities for standby support in case of an
information systems emergency. This group will act as an efficient corrective control, and should
also act as a single point of contact for all incidents and issues related to information systems.
CHAP (Challenge Handshake Authentication Protocol) - answer✔✔Common remote access
protocol authentication method; the serving system challenges the remote client, usually by
means of asking for a password. (The hash is transmitted)
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Brightstars. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €10,89. Je zit daarna nergens aan vast.