CompTIA Sec+ Practice

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)? (Select 2 answers)

Policy Engine (PE), Policy Administrator (PA)

2
New cards

Which of the following statements about honeypots are true? (Select 2 answers)

Honeypots mimic real systems to attract cyber attackers, Honeypots contain apparent vulnerabilities that are closely monitored by a security team

3
New cards

A honeyfile can be any type of file (e.g., a document, email message, image, or video file) containing real user data intentionally placed within a network or system to attract potential attackers or unauthorized users. (T/F)

False

4
New cards

What is a honeytoken?

A unique identifier that is designed to track attackers

5
New cards

Which of the following should not be used as honeytokens? (Select all that apply)

Active user account credentials, Actual URLs to live websites or resources

6
New cards

A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:

Business Impact Analysis (BIA)

7
New cards

A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as:

Public Key Infrastructure (PKI)

8
New cards

Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?

Self-encrypting drives (SEDs)

9
New cards

Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?

Full Disk Encryption (FDE)

10
New cards

An MS Windows component that enables encryption of individual files is called:

Encrypting File System (EFS)

11
New cards

Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)

GNU Privacy Guard (GPG), Pretty Good Privacy (PGP)

12
New cards

Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?

SHTTP