CompTIA Security+ SY0-701 Questions And Answers.
Honeypot - Answer -A decoy system on the network.
Honey token - Answer -A small piece of decoy data used to track an intruder.
Policy - Answer -A document that is the primary example of an administrative control.
Access control vestibule - Answer -A physical control that disallows tailgating and
piggybacking.
Firewall - Answer -A logical control that that disallows certain types of traffic from
entering or leaving the network.
Compensating control - Answer -A control type that provides a workaround for systems
with weak security.
Public key - Answer -The asymmetric key used to encrypt the data.
Private key - Answer -The asymmetric key used to decrypt the data.
Symmetric encryption - Answer -A type of encryption that uses the same key to encrypt
and decrypt.
Wildcard certificate - Answer -A certificate type that can be applied to both the parent
domain all possible subdomains.
Shadow IT - Answer -Do-it-yourself IT performed by end users.
dot-dot-slash (../) - Answer -The URL string that identifies a directory traversal attack.
Tailgating - Answer -When an unauthorized person follows you into a secure area
WITHOUT your knowledge.
Input sanitization - Answer -The most basic practice a programmer can use to protect a
web app from injection attacks.
Buffer overflow - Answer -A type of attack in which malware overwrites memory
addresses with its own code.
' or 1=1-- - Answer -The most basic SQL injection statement.
Sideloading - Answer -The act of installing software outside of approved channels.
Cross-site Request Forgery - Answer -A web app attack that abuses a server's trust in
an already authenticated client.
Honeypot - Answer -A decoy system on the network.
Honey token - Answer -A small piece of decoy data used to track an intruder.
Policy - Answer -A document that is the primary example of an administrative control.
Access control vestibule - Answer -A physical control that disallows tailgating and
piggybacking.
Firewall - Answer -A logical control that that disallows certain types of traffic from
entering or leaving the network.
Compensating control - Answer -A control type that provides a workaround for systems
with weak security.
Public key - Answer -The asymmetric key used to encrypt the data.
Private key - Answer -The asymmetric key used to decrypt the data.
Symmetric encryption - Answer -A type of encryption that uses the same key to encrypt
and decrypt.
Wildcard certificate - Answer -A certificate type that can be applied to both the parent
domain all possible subdomains.
Shadow IT - Answer -Do-it-yourself IT performed by end users.
dot-dot-slash (../) - Answer -The URL string that identifies a directory traversal attack.
Tailgating - Answer -When an unauthorized person follows you into a secure area
WITHOUT your knowledge.
Input sanitization - Answer -The most basic practice a programmer can use to protect a
web app from injection attacks.
Buffer overflow - Answer -A type of attack in which malware overwrites memory
addresses with its own code.
' or 1=1-- - Answer -The most basic SQL injection statement.
Sideloading - Answer -The act of installing software outside of approved channels.
Cross-site Request Forgery - Answer -A web app attack that abuses a server's trust in
an already authenticated client.