100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Comptia Security+ 04/2025 Exam Questions and Answers

Puntuación
-
Vendido
-
Páginas
80
Grado
A+
Subido en
01-06-2025
Escrito en
2024/2025

Comptia Security+ 04/2025 Exam Questions and Answers

Institución
CompTIA
Grado
CompTIA











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA
Grado
CompTIA

Información del documento

Subido en
1 de junio de 2025
Número de páginas
80
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Comptia Security+ 04/2025 Exam
Questions and Answers


acceptable use policy (AUP) - ANSWER✔✔-A policy that governs employees' use of company

equipment and Internet services. ISPs may also apply AUPs to their customers.


access badge - ANSWER✔✔-An authentication mechanism that allows a user to present a smart

card to operate an entry system.


access control list (ACL) - ANSWER✔✔-The collection of access control entries (ACEs) that

determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access

to the object and the privileges given (read-only, read/write, and so on).


access control vestibule - ANSWER✔✔-A secure entry system with two gateways, only one of

which is open at any one time.




Think Airlock


access point (AP) - ANSWER✔✔-A device that provides a connection between wireless devices and

can connect to wired networks, implementing an infrastructure mode WLAN.




FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 1

,account lockout - ANSWER✔✔-Policy that prevents access to an account under certain conditions,

such as an excessive number of failed authentication attempts.


account policies - ANSWER✔✔-A set of rules governing user security information, such as

password expiration and uniqueness, which can be set globally.


accounting - ANSWER✔✔-Tracking authorized usage of a resource or use of rights by a subject

and alerting when unauthorized use is detected or attempted.


acquisition/procurement - ANSWER✔✔-Policies and processes that ensure asset and service

purchases and contracts are fully managed, secure, use authorized suppliers/vendors, and meet

business goals.


active reconnaissance - ANSWER✔✔-Penetration testing techniques that interact with target

systems directly.


active security control - ANSWER✔✔-Detective and preventive security controls that use an agent

or network configuration to monitor hosts. This allows for more accurate credentialed scanning, but

consumes some host resources and is detectable by threat actors.


ad hoc network - ANSWER✔✔-A type of wireless network where connected devices communicate

directly with each other instead of over an established medium.


address resolution protocol (ARP) - ANSWER✔✔-Broadcast mechanism by which the hardware

MAC address of an interface is matched to an IP address on a local network segment.


advanced persistent threat (APT) - ANSWER✔✔-An attacker's ability to obtain, maintain, and

diversify access to network systems using exploits and malware.



FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 2

,adware - ANSWER✔✔-Software that records information about a PC and its user. Adware is used

to describe software that the user has acknowledged can record information about their habits.


AES Galois Counter Mode Protocol (GCMP) - ANSWER✔✔-A high performance mode of

operation for symmetric encryption. Provides a special characteristic called authenticated encryption

with associated data, or AEAD.


air-gapped - ANSWER✔✔-A type of network isolation that physically separates a host from other

hosts or a network from all other networks.


alert tuning - ANSWER✔✔-The process of adjusting detection and correlation rules to reduce

incidence of false positives and low-priority alerts.


algorithm - ANSWER✔✔-Operations that transform a plaintext into a ciphertext with

cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher

types.


allow listing - ANSWER✔✔-A security configuration where access is denied to any entity (software

process, IP/domain, and so on) unless the entity appears on an allow list.


amplification attack - ANSWER✔✔-A network-based attack where the attacker dramatically

increases the bandwidth sent to a victim during a DDoS attack by implementing an amplification

factor.


analysis - ANSWER✔✔-An incident response process in which indicators are assessed to determine

validity, impact, and category.




FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 3

, annualized loss expectancy (ALE) - ANSWER✔✔-The total cost of a risk to an organization on an

annual basis. This is determined by multiplying the SLE by the annual rate of occurrence (ARO).


annualized rate of occurrence (ARO) - ANSWER✔✔-In risk calculation, an expression of the

probability/likelihood of a risk as the number of times per year a particular loss is expected to occur.


anomalous behavior recognition - ANSWER✔✔-Systems that automatically detect users, hosts, and

services that deviate from what is expected, or systems and training that encourage reporting of this

by employees.


antivirus - ANSWER✔✔-Inspecting traffic to locate and block viruses.


antivirus scan (A-V) - ANSWER✔✔-Software capable of detecting and removing virus infections

and (in most cases) other types of malware, such as worms, Trojans, rootkits, adware, spyware,

password crackers, network mappers, DoS tools, and so on.


anything as a service - ANSWER✔✔-The concept that most types of IT requirements can be

deployed as a cloud service model.


appliance firewall - ANSWER✔✔-A standalone hardware device that performs only the function of

a firewall, which is embedded into the appliance's firmware.


application programming interface - ANSWER✔✔-Methods exposed by a script or program that

allow other scripts or programs to use it. For example, an API enables software developers to access

functions of the TCP/IP network stack under a particular operating system.


application virtualization - ANSWER✔✔-A software delivery model where the code runs on a

server and is streamed to a client.



FOR STUDY PURPOSES ONLY COPYRIGHT © 2025 ALL RIGHTS RESERVED 4
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EmilyCharlene Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
447
Miembro desde
2 año
Número de seguidores
138
Documentos
21009
Última venta
1 día hace
Charlene\'s Scholastic Emporium.

Your Actual and Virtual Exam Tests Excellent Tutor.

3.7

98 reseñas

5
46
4
13
3
15
2
7
1
17

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes