• Tidak ada hasil yang ditemukan

369 comptia security

N/A
N/A
Khoirul Anwar

Academic year: 2025

Membagikan "369 comptia security"

Copied!
8
0
0

Teks penuh

(1)

1. What is the primary objective of CompTIA Security+ certification?

a) Networking fundamentals

b) Cybersecurity knowledge and skills validation c) Cloud computing proficiency

d) Software development expertise

Answer: b) Cybersecurity knowledge and skills validation

2. Which of the following is a common threat to information security?

a) Data encryption b) Firewall configuration c) Malware infection

d) Regular software updates Answer: c) Malware infection

3. Which domain of CompTIA Security+ focuses on access control, authentication, and authorization?

a) Network Security

b) Identity and Access Management c) Cryptography

d) Risk Management

Answer: b) Identity and Access Management

4. What is the purpose of a firewall in network security?

a) Data encryption b) Virus scanning

c) Traffic monitoring and filtering d) Access control list management Answer: c) Traffic monitoring and filtering

(2)

5. Which type of attack involves sending fraudulent emails to deceive individuals into revealing sensitive information?

a) Denial-of-Service (DoS) attack b) Phishing attack

c) Man-in-the-Middle (MitM) attack d) SQL injection attack

Answer: b) Phishing attack

6. What does the CIA triad represent in information security?

a) Confidentiality, Identity, and Authorization b) Control, Integrity, and Availability

c) Compliance, Incident Response, and Audit

d) Cryptography, Intrusion Detection, and Authentication Answer: b) Control, Integrity, and Availability

7. Which encryption method uses the same key for both encryption and decryption?

a) Asymmetric encryption b) Triple DES

c) Symmetric encryption d) RSA

Answer: c) Symmetric encryption

8. What is the purpose of penetration testing in cybersecurity?

a) Identifying security vulnerabilities and weaknesses in systems b) Encrypting sensitive data

c) Conducting incident response procedures d) Configuring firewalls

Answer: a) Identifying security vulnerabilities and weaknesses in systems

(3)

9. What is the role of a security administrator in an organization?

a) Managing server hardware b) Writing software code c) Analyzing network traffic

d) Implementing and maintaining security measures

Answer: d) Implementing and maintaining security measures

10. Which type of attack floods a network or system to disrupt its normal operations?

a) Denial-of-Service (DoS) attack b) Man-in-the-Middle (MitM) attack c) Spoofing attack

d) Phishing attack

Answer: a) Denial-of-Service (DoS) attack

11. What is the purpose of risk management in information security?

a) Identifying vulnerabilities in hardware components b) Ensuring compliance with industry standards c) Assessing and mitigating potential security risks d) Configuring firewalls and routers

Answer: c) Assessing and mitigating potential security risks

12. Which security principle states that individuals should only have access to the resources they need to perform their job functions?

a) Least privilege

b) Strong password policy c) Data classification d) Network segmentation Answer: a) Least privilege

(4)

13. What is the purpose of a virtual private network (VPN)?

a) Encrypting network traffic to secure data transmission b) Preventing Denial-of-Service (DoS) attacks

c) Monitoring network activities in real-time d) Blocking malicious websites

Answer: a) Encrypting network traffic to secure data transmission

14. What does the term "Social Engineering" refer to in the context of cybersecurity?

a) Utilizing social media for marketing purposes

b) Exploiting vulnerabilities in social networking platforms c) Manipulating individuals to disclose sensitive information d) Implementing privacy settings in online accounts

Answer: c) Manipulating individuals to disclose sensitive information

15. Which security concept ensures that data is not altered or tampered with during transmission or storage?

a) Confidentiality b) Availability c) Integrity d) Authentication Answer: c) Integrity

16. Which encryption algorithm is commonly used for securing internet communications, such as HTTPS connections?

a) RSA b) AES c) DES d) MD5

Answer: b) AES

(5)

17. What is the purpose of hashing in cryptography?

a) Encrypting data at rest

b) Securing network communications

c) Converting plaintext data to unreadable format d) Authenticating users during login

Answer: c) Converting plaintext data to unreadable format

18. What is the primary goal of incident response in cybersecurity?

a) Identifying potential security risks b) Preventing unauthorized access to data

c) Restoring normal operations after a security breach d) Configuring firewalls and intrusion detection systems Answer: c) Restoring normal operations after a security breach

19. Which type of attack involves intercepting and altering communication between two parties without their knowledge?

a) Spoofing attack b) Brute force attack c) Ransomware attack

d) Man-in-the-Middle (MitM) attack

Answer: d) Man-in-the-Middle (MitM) attack

20. What is the purpose of a biometric authentication system?

a) Identifying security vulnerabilities in a network b) Encrypting data transmission between devices

c) Verifying an individual's identity based on unique physical characteristics d) Monitoring network traffic in real-time

Answer: c) Verifying an individual's identity based on unique physical characteristics

(6)

21. Which security concept involves dividing a network into smaller segments to control and restrict access between them?

a) Network address translation b) Virtualization

c) Network segmentation d) VLANs (Virtual LANs)

Answer: c) Network segmentation

22. Which security control is designed to detect and prevent unauthorized access to a computer system or network?

a) Firewall

b) Antivirus software

c) Intrusion detection system (IDS) d) Data encryption

Answer: a) Firewall

23. Which security principle emphasizes that data should be accessible to authorized users when needed?

a) Availability b) Integrity c) Confidentiality d) Authentication Answer: a) Availability

24. Which of the following is an example of a multi-factor authentication (MFA) method?

a) Username and password b) Fingerprint scan and smart card c) Encryption key and PIN

d) Captcha and security question

(7)

Answer: b) Fingerprint scan and smart card

25. What is the purpose of a security policy in an organization?

a) Identifying and mitigating security risks b) Configuring firewall rules

c) Monitoring network traffic d) Implementing

encryption algorithms

Answer: a) Identifying and mitigating security risks

26. Which security practice involves updating software and operating systems to protect against known vulnerabilities?

a) Regular backup

b) Network segmentation c) Patch management

d) Identity and access management Answer: c) Patch management

27. Which security concept involves classifying data based on its sensitivity level and applying appropriate access controls?

a) Least privilege

b) Network segmentation c) Data classification d) Incident response

Answer: c) Data classification

28. What is the purpose of an intrusion detection system (IDS) in cybersecurity?

a) Blocking malware and viruses from entering the network

(8)

b) Monitoring network traffic for suspicious activities c) Encrypting sensitive data during transmission d) Configuring firewall rules

Answer: b) Monitoring network traffic for suspicious activities

29. Which type of malware is designed to encrypt a victim's data and demand ransom for its release?

a) Trojan horse b) Worm c) Ransomware d) Spyware

Answer: c) Ransomware

30. What is the role of a Security Analyst in an organization's cybersecurity team?

a) Managing network hardware devices

b) Designing user interfaces for software applications

c) Analyzing security incidents and implementing security measures d) Performing data entry and database management

Answer: c) Analyzing security incidents and implementing security measures

Referensi

Dokumen terkait