Exam compass security quizlet. Start studying ExamCompass: Security+ Quiz - Malware.


Exam compass security quizlet Study with Quizlet and memorize flashcards containing terms like A type of hierarchical database structure used in Windows Server environments that enables centralized management of users, devices and resources on a network is known as:, An authentication subsystem in which a single set of authentication credentials provides access to multiple systems across different organizations is called Security controls (i. SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has Study with Quizlet and memorize flashcards containing terms like BIOS/UEFI passwords improve the security of a computer host. Study with Quizlet and memorize flashcards containing terms like A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is called:, The practice of using a telephone system to manipulate user into disclosing confidential information is known as:, A situation in which an unauthorized person can view another user Study with Quizlet and memorize flashcards containing terms like Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). Free online score reports are available upon completion of each practice exam. Sep 19, 2023 · Study with Quizlet and memorize flashcards containing terms like Firewall, Router, Exception and more. A researcher classifies and processes the data collected in order to test a hypothesis. 254. 1/4. Oct 2, 2024 · Study with Quizlet and memorize flashcards containing terms like Installing web browser extensions and plug-ins from trusted sources (e. 254 172. f. Study with Quizlet and memorize flashcards containing terms like Which of the following answers refers to an SSL/TLS-based directory access protocol? H. , What is the purpose of a DoS attack? Code injection Resource exhaustion Malware infection Privilege escalation, A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required is know as Study with Quizlet and memorise flashcards containing terms like Which of the following access control models enforces the strictest set of access rules?, A security solution that provides control over elevated (i. Study with Quizlet and memorize flashcards containing terms like A computer network service that allows clients to make indirect network connections to other network services is called:, A software tool used for monitoring and examining contents of the network traffic is known as:, 802. 1x is an IEEE standard defining: and more. security measure that's in place when a client is denied access to the network due to an outdated antivirus software Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. Implicit deny policy, C. > Security and Maintenance > Power Start studying Exam Compass Practice Test 5. -Encrypts only the password in the access-request packet E. (T or F), A suite of security extensions for an Internet service that translates domain names into IP addresses is known as:, Which of the following answers refers to a non-proprietary cryptographic network Oct 8, 2024 · Which of the statements listed below can be used to describe private network setting in Windows? (Select 3 answers) The PC remains hidden from other devices on the network Used for trusted networks, such as home or work networks The PC can't be used for file and printer sharing Enables the PC to become discoverable to other devices on the network Used for untrusted network, such as a WiFi Study with Quizlet and memorize flashcards containing terms like security feature of a network switch that provides countermeasures against rogue DHCP servers is called: DHCPscope DHCPreservation DHCPsnooping DHCPrelayagent, Which of the following answers refers to an endpoint security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber Study with Quizlet and memorize flashcards containing terms like Which of the answers listed below refers to an IPv6 link-local address? 2002::/16 FE80::/10 2001::/32 ::1/128, Which of the following answers refers to an IPv4 loopback address? ::1 FE80::/10 0:0:0:0:0:0:0:1 169. The scan results show open ports, protocols, and services exposed on the target host B. , Which of the Study with Quizlet and memorize flashcards containing terms like The main functionality of the Basic Input/Output System (BIOS) is to perform the initial hardware checks after the computer is powered on and start up the operating system. Social engineering, True and more. Study with Quizlet and memorize flashcards containing terms like What is a PUP? (Select 3 answers) A type of computer program not explicitly classified as malware by AV software. Match a term on the left with its correct definition from the corresponding drop-down list. Study with Quizlet and memorize flashcards containing terms like Technical Controls, 3 examples of technical security controls, Managerial controls and more. DHCP snooping E. 0. About Quizlet An access control vestibule (a. The difference between static KBA and dynamic KBA is that in the case of static KBA authentication process relies on pre-determined security questions and answers chosen in advance by the user during the account creation process. 323 PPTP Kerberos LDAPS, What are the characteristic features of the secure version of IMAP? (Select all that apply) TCP port 143 Secure Sockets Layer (SSL) TCP port 993 Transport Layer Security (TLS) TCP port 995, Which of the following Study with Quizlet and memorize flashcards containing terms like Which of the following can be used to validate the origin (provenance) of digital evidence? (Select 2 answers) Hashing Tokenization Salting Metadata examination Checksums, The process of searching, collecting, and securing electronic data with the intent of using it in a legal proceeding or investigation is known as: OSINT E Study with Quizlet and memorize flashcards containing terms like In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:, In active-active mode, load balancers distribute network traffic across:, In active-passive mode, load balancers distribute network traffic across: and more. (Bracketing, Confidential bait, Deliberate false statements, Feigned ignorance, Denial of the obvious, and Flattery) a. A researcher decides on the data needed to test a hypothesis, the methods for data collection, and the techniques for data analysis. using praise to coax a person into providing information c. Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. An application downloaded and installed without the user's consent (illegal app) C. 254/16 127. -Separates - A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited ads - An application downloaded and installed with the user's consent - A type of computer program not explicitly classified as malware by AV software Study with Quizlet and memorize flashcards containing terms like URL Hijacking (Typosquatting), Shimming, Refactoring and more. Study with Quizlet and memorize flashcards containing terms like Which of the following answers refers to an STP frame?, The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server. Study with Quizlet and memorize flashcards containing terms like AES (Advanced Encryption Standard), S/MIME (Secure/Multipurpose Internet Mail Extensions), SFTP (Secure File Transfer Protocol) and more. An application downloaded and installed without the user's consent (illegal app). The scan enumerated software versions of installed programs C. EAP and more. Study with Quizlet and memorize flashcards containing terms like Infrastructure mode: is an 802. , Microsoft Store for Microsoft Edge, or Google Play for Google Chrome) instead of third-party sites decreases malware-related security risks. pretending to be ignorant of a topic in order to exploit the person's tendency to educate b. A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. To be effective, an AV program needs up-to-date versions of these files which can be obtained through an AV software update feature. Stenography and more. (SSL) - TCP port 993 - Transport Layer Security About Quizlet; How Quizlet works; Careers; Study with Quizlet and memorize flashcards containing terms like Which of the following answers does not refer to an email communication threat vector?, Which of the following mitigates the risk of supply chain attacks?, Examples of social media threat vectors include: and more. 45. Study with Quizlet and memorize flashcards containing terms like Which of the following answers can be used to describe technical security controls?, Which of the answers listed below refer to examples of technical security controls?, Which of the following answers refer to the characteristic features of managerial security controls? and more. ARO, B. Quiz yourself with questions and answers for ExamCompass: Security+ Practice Exam 10, so you can be ready for test day. Study with Quizlet and memorise flashcards containing terms like Which of the following answers refers to an STP frame?, The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP network server. Study with Quizlet and memorize flashcards containing terms like B. Earth Science Exam 3. Study with Quizlet and memorize flashcards containing terms like In Windows 10, Microsoft Defender Antivirus can be enabled/disabled via:, Virus definition database files contain detection patterns for known viruses. , True or False: SFTP is an extension of the FTP Study with Quizlet and memorize flashcards containing terms like What is the last usable host IP address for the 172. e. Study with Quizlet and memorize flashcards containing terms like A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company's firewall is called:, A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:, Which of the answers listed below refers to an IoT A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations. DHCP relay agent, Which of the following answers refers to an endpoint security solution that provides the capability for detection, analysis, response, and real-time Study with Quizlet and memorize flashcards containing terms like Which of the following statements are true?, Which of the statements listed below apply to Windows workgroups? (Select 3 answers), The configuration settings that allow to change the computer name and domain/workgroup membership in Windows 10 can be accessed via: and more. 11 networking framework in which devices communicate with each other by first going through an Access Point (AP), Attenuation: attenuation is a natural consequence of signal transmission over long distances and obstacles. Learn vocabulary, terms, and more with flashcards, games, and other study tools. 121. , What type of network traffic filtering criteria can be set on a router?, Which of the answers listed below refers to an application Study with Quizlet and memorize flashcards containing terms like Application firewall, Stateful inspection, False and more. Study with Quizlet and memorize flashcards containing terms like A. Study with Quizlet and memorize flashcards containing terms like B. g. Firewall, D. Study with Quizlet and memorize flashcards containing terms like Which type of script file would be used to store a series of commands designed to automate tasks in DOS, OS/2, and Microsoft Windows?, Which of the answers listed below refers to the filename extension of a Microsoft PowerShell script file?, Files with this filename extension are used in a scripting language based on the The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection. 252. TLS, C. Exam Compass Chapter 11. WEP, C. Flashcards; A mobile security Study with Quizlet and memorize flashcards containing terms like What are the characteristic features of RADIUS? (Select 3 answers)- A. , Which of the following servers would be best suited to act as an intermediary between an intranet and a screened subnet? and others. Study with Quizlet and memorize flashcards containing terms like 88, RDP, 80 and more. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. 11n standard offers backward compatibility with which of the following standards? (Select all that apply), The IEEE 802. 1, Which of the following answers refer to IPv6 loopback addresses? Exam Compass Learn with flashcards, games, and more — for free. Study with Quizlet and memorize flashcards containing terms like The IEEE 802. 0 255. self-replicating computer program containing malicious segment Requires its host application to be run to make the virus active B. Study with Quizlet and memorize flashcards containing terms like Embedded geotag, BYOD, With enhanced security features and more. Study with Quizlet and memorize flashcards containing terms like C. Online CompTIA Security+ certification practice test 1. Study with Quizlet and memorize flashcards containing terms like What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? Study with Quizlet and memorize flashcards containing terms like Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) Code obfuscation Steganography SSID broadcast suppression Encryption Substitution ciphers, Which of the answers listed below refers to a solution designed to strengthen the security of session keys? Mar 17, 2022 · A security auditor is reviewing vulnerability scan data provided by an internal security team. Control Objective A statement of the desired result or purpose to be achieved by implementing a control or set of controls. Memory dump, temporary files, disk files, archival media, A. SLE, B. 0 Jun 20, 2024 · Quiz yourself with questions and answers for N10-008 ExamCompass Security Concepts, so you can be ready for test day. Study with Quizlet and memorize flashcards containing terms like Geofencing, GPS, Screen lock and more. Quiz yourself with questions and answers for ExamCompass: Workstation Security, so you can be ready for test day. ALE = ARO x SLE and more. Study with Quizlet and memorize flashcards containing terms like Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:, Which of the following statements apply to the definition of a computer virus? (Select 3 answers) -A self-replicating computer program containing malicious segment Quiz yourself with questions and answers for Security+ ExamCompass Quizzes 1-4, so you can be ready for test day. Study with Quizlet and memorise flashcards containing terms like Which of the following tools enables automated response to security incidents?, A security solution designed to detect anomalies in the log and event data collected from multiple network devices is called:, An industry standard for assessing the severity of computer system security vulnerabilities is known as: and others. 120. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. , Which of the following servers would be best suited to act as an intermediary between an intranet and a screened subnet? and more. -Primarily used for device administration F. 1 and more. SSL F. Study with Quizlet and memorize flashcards containing terms like Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP). , True and more. e. Primarily used for network access- B. g. Phishing C. Provides higher level of security than copper cabling Study with Quizlet and memorize flashcards containing terms like Which of the following answers can be used to describe technical security controls?, Which of the answers listed below refer to examples of technical security controls?, Which of the following answers refer to the characteristic features of managerial security controls? and more. 323 PPTP Kerberos LDAPS, What are the characteristic features of the secure version of IMAP? (Select all that apply) TCP port 143 Secure Sockets Layer (SSL) TCP port 993 Transport Layer Security (TLS) TCP port 995, Which of the following Study with Quizlet and memorize flashcards containing terms like *What is a PUP? (3 answers) A. 192. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he Study with Quizlet and memorize flashcards containing terms like Bluesnarfing, Marking unsecured wireless networks, C. a. Study with Quizlet and memorize flashcards containing terms like A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:, Which of the following answers refers to an endpoint security solution that provides the capability for detection, analysis, response, and real-time monitoring of cyber threats?, A software or hardware-based security Study with Quizlet and memorize flashcards containing terms like After completing the initial diagnostics and assigning system resources, the startup BIOS program checks for information about secondary storage devices that might contain the OS. Quiz yourself with questions and answers for Exam compass security + Missed questions 16-20, so you can be ready for test day. Start studying ExamCompass: Security+ Quiz - Malware. Exception and more. Study with Quizlet and memorise flashcards containing terms like Which of the following is used in data URL phishing?, Which type of malware resides only in RAM?, Which password attack bypasses account-lockout policies? and others. DDoS F. Study with Quizlet and memorize flashcards containing terms like The lack of entropy in the process of generating cryptographic keys improves the security of cryptographic algorithms. IV attack and more. Study with Quizlet and memorize flashcards containing terms like Which of the following answers can be used to describe technical security controls?, What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)?, In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection. WPA2, D. Integrity and more. saying something wrong in the Quiz yourself with questions and answers for Exam compass security + Missed questions 21-26, so you can be ready for test day. 168. administrative type) accounts is known as:, Which of the following answers refers to a rule-based access control mechanism associated with files and/or directories? and others. A measure of confidence that intended security controls are effective in their application. 123. Study with Quizlet and memorize flashcards containing terms like A social engineering technique whereby attackers under disguise of a legitimate attack request attempt to gain access to confidential information is known as_____, Which answers refer to smishing? The Security+ Exam is very straightforward, you either know it or you don't. About us. 11g standard is backwards compatible with:, An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against: and more. A researcher decides to study the intelligence level of only children. Free practice tests based on the current Security+ exam objectives published by CompTIA. Explore quizzes and practice tests created by teachers and students or create one from your course material. , internal storage drive inside computer case). -Combines authentication and authorization D. A type of computer program not explicitly classified as malware by AV software B. Exam Compass CompTIA A+ Certification Exam 220-1102 Practice Test 5 Learn with flashcards, games, and more — for free. Encrypts the entire payload of the access-request packet C. CompTIA Security+ Certification Practice Test Questions. This test consists of 25 practice questions. The list of devices and the order in which they should be checked can be found and arranged in the CMOS setup utility, and this option is commonly Study with Quizlet and memorize flashcards containing terms like A security feature of a network switch that provides countermeasures against rogue A. , safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software or firmware components of the system. True False, Which of the following resources can be used by an Operating System (OS) to communicate with hardware? (Select 2 answers) Device Manager Secure Study with Quizlet and memorize flashcards containing terms like Which of the following security measures can be used to prevent VM sprawl?, What are the countermeasures against VM escape?, Which programming aspects are critical for secure application development process? and more. I made flash cards from the CompTia study guide book, which you can find here: https://quizlet. 90 terms. Study with Quizlet and memorize flashcards containing terms like The term "Data-at-rest encryption" refers to the encryption process that is applied to data residing in persistent storage (e. On the 6th and 7th practice tests, for any questions that I’m stumped on or answer options that I feel like I don’t fully understand, I’ve just taken a note of it and made my best guess at the answer (which is what you’d have to do on the real exam!). , Which of the following allows to check digital certificate validity?, Private-browsing mode (InPrivate browsing in Study with Quizlet and memorize flashcards containing terms like Statement on Standards for Attestation Engagements 18 (SSAE 18) is a standard from the American Institute of Certified Public Accountants (AICPA). DHCP reservation D. Router, B. Study with Quizlet and memorize flashcards containing terms like What is the name of a network protocol that enables secure file transfer over SSH? TFTP SFTP Telnet FTPS, True or False: The MIME specification enables the transfer of multimedia files over email, and S/MIME enhances it with encryption, authentication, and message integrity. 240. The test is about half vocabulary test so flashcards helped me a lot. Study with Quizlet and memorise flashcards containing terms like A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company's firewall is called:, A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:, Which of the answers listed below refers to an IoT Study with Quizlet and memorize flashcards containing terms like C. Jun 26, 2024 · Study with Quizlet and memorize flashcards containing terms like Which of the answers listed below refers to an OS that uses web browser as its main user interface?, Installing web browser extensions and plug-ins from trusted sources (e. Large amount of ICMP echo replies, A. Quiz yourself with questions and answers for Wireless Security Quiz (Exam Compass), so you can be ready for test day. True False, Which of the following terms refer to the concept of confidentiality? (Select 3 answers) Fault tolerance Encryption Non-repudiation Access control methods Steganography Redundancy Patch management Hashing Load balancing, Which of Study with Quizlet and memorize flashcards containing terms like _____enables the exchange of information between computer programs. . Hot site, False, A. Which of the following BEST indicates that valid credentials were used? A. Demilitarized Zone, C. 122. DHCP servers is called: B. Take the Exam Compass if you want to be really confident in your ability to answer any question no matter what it is. 254, How many usable IP addresses can be assigned to hosts on a /26 subnet? 254 126 62 30, What is the dot-decimal representation of a /13 subnet mask? 255. Score reports (a list of all responses with percentage score) are displayed upon completion of each practice exam. TCP/IP, True and more. All tests are available online for free (no registration / email required). Encryption D. k. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering mantrap from the outside remains locked inside until he/she provides Quiz yourself with questions and answers for Exam Compass Security + Test 4, so you can be ready for test day. , The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often Study with Quizlet and memorize flashcards containing terms like The term "CIA triad" is used to describe the basic principles of information security. IDS vs IPS Illustrates the difference between passive and active security breach response. Hoover860. IP spoofing C. Study with Quizlet and memorize flashcards containing terms like An access control vestibule (a. standalone malicious computer program that replicates itself over a computer network C. Quiz yourself with questions and answers for 0_1ExamCompass 1101 Test(Tests 1 to 10), so you can be ready for test day. DHCP scope C. A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display unsolicited Study with Quizlet and memorize flashcards containing terms like Which wireless encryption scheme offers the highest level of protection?, Which of the answers listed below refers to a security protocol designed to strengthen WEP implementations?, Which of the following wireless technologies has been deprecated and should not be used due to its known vulnerabilities? and more. , Which of the following actions in Windows 10 Study with Quizlet and memorize flashcards containing terms like DHCP, True, Reservation and more. Study with Quizlet and memorize Study with Quizlet and memorize flashcards containing terms like Which of the answers listed below refers to a security protocol designed to strengthen WEP implementations?, Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?, Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode? and more. 0/23 network? 172. A type of software that may adversely affect the computer's security and performance, compromise user's privacy, or display Study with Quizlet and memorize flashcards containing terms like A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company's firewall is called:, A type of contactless smart card that can be read at a close range from a reader device is commonly referred to as:, Which of the answers listed below refers to an IoT Study with Quizlet and memorize flashcards containing terms like Which of the following answers refers to an SSL/TLS-based directory access protocol? H. Exam SY0-701. com/quizlette1077795/folders/security?x=1xqU&i=41kvrg Study with Quizlet and memorize flashcards containing terms like B. 248. System image, B. sze hxn nig hqmn aisiavky zbxdw ythn detrp nyl iljuzy