CompTIA Security+ New

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Why is enforcing baselines critical when automating system security?

It ensures systems maintain a standard secure configuration, reducing vulnerabilities and aiding automation efficiency.

2
New cards

How can scripting improve onboarding processes in terms of system access?

It automates account creation, default passwords, and role-based access rights for new employees.

3
New cards

What is the primary purpose of baselines in security operations?

To standardize system configurations and maintain security consistency, not to eliminate monitoring.

4
New cards

What is a practical benefit of maintaining a known secure state across all systems?

It allows automated tasks to run reliably and reduces the chance of configuration drift-related incidents.

5
New cards

How does enforcing baselines impact incident response automation?

It helps automation tools work efficiently, but human intervention is still needed for decision-making.

6
New cards

What is the term for formally confirming that compliance reports are accurate and complete?

Attestation

7
New cards

Which concept defines the maximum risk a company is willing to take before acting?

Risk threshold

8
New cards

How is an organization's predetermined acceptable risk exposure described?

Risk tolerance

9
New cards

What does "national legal implications" refer to in data security?

Country-level laws regulating how personal data is collected, stored, and processed

10
New cards

Which SDLC principle ensures security is considered throughout software development?

Security integration across all SDLC phases, from design to maintenance

11
New cards

What is a major security concern for SCADA systems in industrial settings?

Limited ability to apply security updates regularly

12
New cards

Which network device type actively evaluates traffic and enforces policies on packets?

Inline device

13
New cards

At which OSI layer does a firewall filter traffic based on port numbers and IP addresses?

Layer 4 (Transport Layer)

14
New cards

What characteristic of a cloud architecture allows quick recovery from failures?

Resilience

15
New cards

What type of system manages and monitors industrial operations and sensor data, requiring special security attention?

SCADA system

16
New cards

Which cryptographic process allows two parties to securely establish a shared secret?

Key exchange

17
New cards

Which type of security control involves management-level evaluation of risks?

Managerial control (e.g., risk assessments)

18
New cards

What mathematical property underlies RSA public key cryptography?

Trapdoor function

19
New cards

Which key should a client use to encrypt a message so only the intended recipient can decrypt it?

Public key

20
New cards

Which TCP port is default for Microsoft SQL Server and should be secured against unauthorized queries?

Port 1433 (1)

21
New cards

If left open, which port could allow unauthorized database access?

Port 1433