IT CertificationsAnswer Key

Comptia Certmaster Ce Security+ Details

66 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

A firewall

ANSWER

any software or hardware device that protects a system or network by blocking unwanted network traffic. Firewalls generally are configured to stop suspicious or unsolicited incoming traffic through a process called implicit deny.

QUESTION 2

A stateful firewall

ANSWER

A stateful firewall does track the active state of a connection and is able to make decisions based on the contents of a network packet as it relates to the state of the connection.

QUESTION 3

stateless firewall

ANSWER

does not track the active state of a connection as it reaches the firewall. It allows or blocks traffic based on some static value associated with that traffic.

QUESTION 4

An access control list (ACL)

ANSWER

a list of objects with permissions attached to those objects. The list specifies which entities (such as individuals) have the rights to access specific resources and to what extent those resources may be modified (if at all).

QUESTION 5

Implicit deny

ANSWER

The principle that establishes that everything that is not explicitly allowed is denied.

QUESTION 6

A VPN concentrator

ANSWER

A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels.

QUESTION 7

Remote access vs. site-to-site

ANSWER

A remote access VPN connects individual remote users to the private network, whereas a site-to-site VPN connects two private networks together.

QUESTION 8

Internet Protocol Security (IPSec)

ANSWER

an open-source protocol framework for security development within the TCP/IP family of protocol standards. IPSec is not application dependent as it operates at the network layer (layer 3) of the OSI model.

QUESTION 9

IPSec transport mode

ANSWER

IPSec encrypts just the IP payload, leaving the IP packet header unchanged so it can be easily routed through the internet

QUESTION 10

IPSec tunnel mode

ANSWER

both the packet contents and header are encrypted.

QUESTION 11

IPSec, Authentication Header (AH)

ANSWER

One of the two protocols used in IPSec, Authentication Header (AH) provides authentication for the origin of transmitted data as well as integrity and protection against replay attacks.

QUESTION 12

IPSec, Encapsulation Security Payload (ESP)

ANSWER

One of the two protocols used in IPSec, provides the same functionality as Authentication Header (AH), with the addition of encryption to support the confidentiality of transmitted data.

QUESTION 13

Split tunnel vs. full tunnel

ANSWER

When a device is connected to the VPN in full tunnel mode, all network traffic is sent through the tunnel and encrypted. In split mode, only some of the traffic is sent through the tunnel and encrypted.

QUESTION 14

TLS/SSL (Transport Layer Security and Secure Sockets Layer)

ANSWER

Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are security protocols that combine digital certificates for authentication with public key data encryption.

QUESTION 15

Always-on VPN

ANSWER

Some VPN concentrators support an always-on capability so that the user's device will automatically connect to the VPN any time it has an Internet connection.

QUESTION 16

NIPS (network-based intrusion prevention system)

ANSWER

A network intrusion prevention system (NIPS) monitors suspicious traffic on the network and reacts in real time to block it.

QUESTION 17

NIDS (network-based intrusion detection system)

ANSWER

A NIDS primarily uses passive hardware sensors to monitor traffic on a specific segment of the network. It can sniff traffic and send alerts about anomalies or concerns.

QUESTION 18

NIPS Signature-based monitoring

ANSWER

Signature-based monitoring uses a predefined set of rules provided by a software vendor or security personnel to identify events that are unacceptable.

QUESTION 19

NIPS Heuristic/Behavioral monitoring

ANSWER

identifies the way in which an entity acts in a specific environment, and makes decisions about the nature of the entity based on this. Behavior-based monitoring identifies the way in which an entity acts, and then reviews future behavior to see if it deviates from the norm.

QUESTION 20

NIPS Anomaly-based monitoring

ANSWER

uses a definition of an expected outcome or pattern to events, and then identifies any events that do not follow these patterns. Events that sufficiently deviate from the preconfigured baseline of acceptable events may be identified as anomalous.

QUESTION 21

Inline vs. passive (in-band vs. out-of-band)

ANSWER

Inline (in-band) monitoring sensors are placed within a network segment so traffic must pass through the monitoring system before it reaches its destination. This allows the system to immediately block suspicious traffic. Passive or out-of-band sensors only receive a copy of the traffic.

QUESTION 22

NIPS Signature-based monitoring rules

ANSWER

Rules are conditions by which a system can identify abnormal operation. In signature-based monitoring, rules are provided by a software vendor or by security personnel to identify events that are unacceptable.

QUESTION 23

Analytics

ANSWER

sets of data provided by systems like IDSs/IPSs that help security administrators identify trends and patterns of a device or a system's operation. Analytics are often provided in the form of logs or in graphical user interfaces (GUIs) for easier interpretation.

QUESTION 24

False negative

ANSWER

occurs when a tool identifies something as not being a vulnerability, when it actually is one. This may lead to issues that go undiscovered for a long time and is considered a catastrophic failure on the part of the scanning tool.

QUESTION 25

Router

ANSWER

A device that transfers data from one network to another in an intelligent way

QUESTION 26

Network Switch

ANSWER

a device that has multiple network ports and combines multiple physical network segments into a single logical network. It controls network traffic on the logical network by creating dedicated, or switched, connections that contain only the two hosts involved in a transmission.

QUESTION 27

Port security

ANSWER

Switches can enforce port security by limiting the unique hardware that is allowed to receive communications on a particular port.

QUESTION 28

Layer 2 functionality

ANSWER

allows standard switches to forward broadcasts to all ports on the switch, but will send individual packets to the specific destination host based on the unique physical address assigned to each network adapter.

QUESTION 29

Layer 3 functionality

ANSWER

allows switches to perform routing functions based on protocol addresses.

QUESTION 30

Switch Loop Prevention

ANSWER

Switches can also implement loop prevention (where traffic is bouncing back and forth between multiple switches connected to each other) by shutting down network access on ports where loops are detected.

QUESTION 31

Switch flood guard

ANSWER

Switches may also have flood guards that protect hosts on the switch against SYN flood and ping flood DoS attacks.

QUESTION 32

Proxy

ANSWER

a device that acts on behalf of one end of a network connection when communicating with the other end of the connection. Proxies are often used as a method of content filtering.

QUESTION 33

Forward Proxy

ANSWER

Proxy used to forward outgoing requests from a private network or intranet to the Internet, usually through a firewall.

QUESTION 34

reverse proxy

ANSWER

A device that routes incoming requests to the correct server.

QUESTION 35

Transparent Proxy

ANSWER

A proxy that does not require any configuration on the user's computer.

QUESTION 36

Application/multipurpose proxy

ANSWER

A special proxy that "knows" the application protocols that it supports. For example, an FTP proxy server implements the protocol FTP.

QUESTION 37

Load balancer

ANSWER

A dedicated network device that can direct requests to different servers based on a variety of factors.

QUESTION 38

Round Robin Scheduling

ANSWER

Works from top to bottom of list directing traffic to the next device.

QUESTION 39

affinity scheduling

ANSWER

A scheduling policy where tasks are preferentially scheduled onto the same processor they had previously been assigned. intended to reduce the number of open network connections between clients and servers.

QUESTION 40

Active-passive load balance mode

ANSWER

one load balancer handles the primary workload, while another load balancer is on standby. If the primary load balancer fails, the load balancer on standby takes over and becomes active.

QUESTION 41

Active-active load balance mode

ANSWER

both load balancers take on equal portions of the workload. If one load balancer fails, the other will keep on providing service.

QUESTION 42

Virtual IP address

ANSWER

An IP address that can be shared by a group of routers. Do not have a physical network interface

QUESTION 43

SSID

ANSWER

Service Set Identifier, can be disabled but isn''t a reliable security feature

QUESTION 44

Access point security

ANSWER

disabling service set identifier broadcast (SSID), MAC filtering, signal configuration and deciding between fat versus thin access points.

QUESTION 45

MAC filtering

ANSWER

A method of controlling access on a wired or wireless network by denying access to an device that their MAC address does not match one that is on a pre-approved list. easily spoofed

QUESTION 46

Signal strength

ANSWER

Adjusting the strength of wireless signals can help contain the range of your network.

QUESTION 47

Band selection/width

ANSWER

5 GHz frequency offers greater bandwidth 2.4 GHz frequency offers a larger range and can more easily penetrate solid objects like walls.

QUESTION 48

Directional antennas

ANSWER

Yagi, Parabolic, Backfire and Cantenna Directional antennas transmit signals to a specific point. Have large gain, meaning reliable connection range and power

QUESTION 49

Omni-directional antennas

ANSWER

Rubber Ducky, ceiling dome send and receive radio waves from all directions, usually as the main distribution source of a wireless signal

QUESTION 50

Fat vs. thin access points

ANSWER

An access point with limited functionality. (It does not provide authentication or encryption.) Requires additional devices to be secure

QUESTION 51

thin access point

ANSWER

Intelligent wireless access point that provides everything needed to manage wireless clients. Need to be configured individually.

QUESTION 52

Fat Access Point

ANSWER

Wireless access point that depends on and connects to WLAN controller to configure wireless security settings. Thin APs

QUESTION 53

Controller-based Access Point

ANSWER

An AP that includes everything needed to connect wireless clients to a wireless network. This must be configured independently. Sometimes called a stand-alone AP. Compare with thin AP.

QUESTION 54

Fat AP

ANSWER

A two-part process consisting of security event monitoring (SEM), which performs real-time monitoring of security events, and security information management (SIM), where the monitoring log files are reviewed and analyzed by automated and human interpreters.

QUESTION 55

Security Information and Event Management (SIEM)

ANSWER

A SIEM feature that can show the order of the events.

QUESTION 56

SIEM time synchronization

ANSWER

To help uphold the integrity of security data, systems that push data to a SIEM can store log files on a Write once read many (WORM) storage medium. This ensures that once data is written, it cannot be modified—only read (in this case, by the SIEM).

QUESTION 57

Logs/WORM

ANSWER

software solution that detects and prevents sensitive information in a system or network from being stolen or otherwise falling into the wrong hands.

QUESTION 58

Data Loss/Leak Prevention (DLP)

ANSWER

The set of standards defined by the network for clients attempting to access it. Usually, NAC requires that clients be virus free and adhere to specified policies before allowing them on the network.

QUESTION 59

Network Access Control (NAC)

ANSWER

Software agents can further be classified as either permanent or dissolvable. A permanent agent stays on the device indefinitely—a dissolvable agent is removed once the device is authenticated.

QUESTION 60

Dissolvable vs. permanent NAC agent

ANSWER

Agent software agents must be installed on the devices that request access for the NAC to carry out its health checks. Agentless NACs use network scanning and analysis techniques to ascertain health information, without devices requiring specific software.

QUESTION 61

Agent vs. agentless NAC

ANSWER

This device or server is placed in the DMZ and sends out or receives e-mail for the organization. It does a virus scan and spam filter check to ensure it is a valid message.

QUESTION 62

Mail gateway

ANSWER

A network device similar to a switch. The main difference is that a bridge has a single port for incoming traffic and a single port for outgoing traffic. Bridges are less ideal for high-speed and high-load networks.

QUESTION 63

Bridge

ANSWER

SSL/TLS accelerators can offload the resource-intensive encryption calculations in SSL/TLS to reduce overhead for the server.

QUESTION 64

SSL/TLS accelerators

ANSWER

SSL/TLS decryptors solve this issue by decrypting traffic and then forwarding the plaintext traffic to the relevant security device for analysis.

QUESTION 65

SSL decryptors

ANSWER

which translate streaming media between different types of networks, may contain voice communications or intellectual property that the organization wants to keep secure.

QUESTION 66

Media gateway

ANSWER

A physical device that deals with the encryption of authentication processes, digital signings, and payment processes.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials