暗記メーカー
ログイン
Comptia Security+ by Dei-Dei
  • Dei-Dei

  • 問題数 20 • 10/25/2024

    記憶度

    完璧

    3

    覚えた

    7

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Which of the following best describes the CIA Triad in information security? A) Control, Identification, Access B) Confidentiality, Integrity, Availability C) Communication, Identification, Analysis D) Cyber, Infrastructure, Assets

    B

  • 2

    What does the "DAD" Triad represent in terms of threats? A) Destruction, Alteration, Disclosure B) Denial, Access, Data loss C) Disruption, Authentication, Defense D) Disclosure, Alteration, Destruction

    D

  • 3

    What is the key difference between Information Security and Cybersecurity? A) Information Security focuses on digital data only B) Cybersecurity includes physical security controls C) Cybersecurity is a subset of Information Security focusing on protecting data in the digital realm D) Information Security is broader and includes Cybersecurity

    C

  • 4

    Which of the following best defines a "threat" in information security? A) A vulnerability in the system B) A potential cause of an unwanted incident C) A patch that fixes security flaws D) A user with administrative privileges

    B

  • 5

    What is a "vulnerability" in the context of cybersecurity? A) A strength of a system B) A weakness that can be exploited by threats C) A method used to defend against attacks D) A security policy

    B

  • 6

    Which of the following is an example of an "exploit"? A) A security policy B) A software patch C) A piece of code that takes advantage of a vulnerability D) An antivirus program

    C

  • 7

    What is the primary goal of a threat actor? A) To secure information systems B) To exploit vulnerabilities for malicious purposes C) To develop security policies D) To improve network performance

    B

  • 8

    Which of the following describes "Security Vulnerabilities"? A) Software tools designed to protect against threats B) Weaknesses in systems or processes that can be exploited by threats C) Legal regulations for data protection D) None of the above

    B

  • 9

    Which of the following best describes "Risk" in the context of information security? A) The likelihood of a vulnerability being exploited by a threat B) The presence of a firewall C) The cost of implementing security measures D) The use of strong passwords

    A

  • 10

    Which of the following is NOT a characteristic of a threat actor? A) Skill level B) Intent C) Resources D) System administrator

    D

  • 11

    What is the MITRE ATT&CK Framework primarily used for? A) Securing physical locations B) Analyzing and categorizing adversary tactics and techniques C) Implementing encryption protocols D) Training employees in cybersecurity awareness

    B

  • 12

    Which of the following phases is NOT part of the Cyber Kill Chain? A) Reconnaissance B) Weaponization C) Mitigation D) Installation

    C

  • 13

    What is the primary objective of the "Reconnaissance" phase in the Cyber Kill Chain? A) To disrupt the network B) To gather information on the target C) To deploy malware D) To exfiltrate data

    B

  • 14

    How does "Integrity" differ from "Confidentiality" in the CIA Triad? A) Integrity ensures data is available when needed, while confidentiality ensures data is encrypted. B) Integrity ensures data accuracy and consistency, while confidentiality ensures data is only accessible to authorized users. C) Integrity focuses on network performance, while confidentiality focuses on user authentication. D) Integrity involves encryption, while confidentiality involves data storage.

    B

  • 15

    Which of the following is an example of a "Threat Actor"? A) A software vulnerability B) A corporate policy C) A cybercriminal D) A firewall

    C

  • 16

    What is the main purpose of the "Weaponization" phase in the Cyber Kill Chain? A) To gather intelligence on the target B) To create or select a weapon (malware) to use against the target C) To install malicious software D) To cover tracks after an attack

    B

  • 17

    Which of the following is a key concept in understanding security vulnerabilities? A) All vulnerabilities are easily exploitable B) Vulnerabilities do not pose a risk unless detected by attackers C) Vulnerabilities are weaknesses that can be exploited by threats D) Vulnerabilities only affect outdated systems

    C

  • 18

    What does the "Actions on Objectives" phase in the Cyber Kill Chain involve? A) Gaining initial access to the target network B) Performing the intended malicious activity, such as data theft or disruption C) Gathering information about the target D) Creating a backdoor for future access

    B

  • 19

    What is the significance of understanding "Threat Actors" in cybersecurity? A) It helps in developing stronger encryption algorithms B) It assists in predicting and defending against potential attacks C) It enables the automation of network defenses D) It is only relevant to government agencies

    B

  • 20

    Which of the following best describes a "Threat"? A) A measure to secure data B) A potential cause of an unwanted incident that may result in harm C) A device used to protect against malware D) A method to update software

    B