CompTIA Security+ Domain 2: Technologies and Tools Welcome to your CompTIA Security+ Domain 2: Technologies and Tools 1. CompTIA Security+: Technologies and Tools What is the primary purpose of a HIDS (Host-based Intrusion Detection System)? A. To monitor and analyze the internals of a computing system B. To manage network firewalls C. To encrypt data transmissions D. To provide a VPN tunnel for remote connections None 2. CompTIA Security+: Technologies and Tools In cybersecurity, what is the primary function of a SIEM (Security Information and Event Management) system? A. Filtering spam emails B. Providing secure remote access C. Real-time analysis of security alerts D. Encrypting data at rest None 3. CompTIA Security+: Technologies and Tools Which technology is most effective for preventing data leakage via email? A. Firewall B. DLP (Data Loss Prevention) C. Antivirus software D. VPN None 4. CompTIA Security+: Technologies and Tools What is the primary purpose of using a WAF (Web Application Firewall)? A. To filter and monitor HTTP/HTTPS traffic to and from a web application B. To provide end-to-end encryption for web traffic C. To manage network bandwidth D. To detect network intrusions None 5. CompTIA Security+: Technologies and Tools In the context of network security, what is the main function of an IPS (Intrusion Prevention System)? A. To detect and prevent known vulnerabilities B. To provide a secure tunnel for data transmission C. To encrypt data in transit D. To analyze network traffic for performance issues None 6. CompTIA Security+: Technologies and Tools Which tool is primarily used for vulnerability scanning in a network? A. Nmap B. Nessus C. Wireshark D. Snort None 7. CompTIA Security+: Technologies and Tools What is the primary purpose of the tcpdump tool in network security? A. Monitoring network traffic for analysis B. Managing firewall rules C. Performing active intrusion prevention D. Encrypting data transmissions None 8. CompTIA Security+: Technologies and Tools In a Public Key Infrastructure (PKI), what is the role of a Certificate Authority (C A. A) To encrypt data using public key cryptography B. To issue and manage digital certificates C. To provide a secure tunnel for data transmission D. To monitor network traffic for malicious activities None 9. CompTIA Security+: Technologies and Tools Which of the following is a primary use case for a protocol analyzer in network security? A. Blocking malicious network traffic B. Analyzing and debugging communication protocols C. Encrypting data packets D. Providing secure remote access None 10. CompTIA Security+: Technologies and Tools What is the primary security function of a UTM (Unified Threat Management) appliance? A. Providing a single platform for multiple security functions B. Offering a secure VPN service C. Encrypting data on a hard disk D. Analyzing user behavior for anomaly detection None 11. CompTIA Security+: Technologies and Tools Which security technology is primarily used to inspect SSL/TLS encrypted traffic at the perimeter of a network? A. Deep Packet Inspection (DPI) B. SSL/TLS Accelerator C. Intrusion Detection System (IDS) D. SSL/TLS Interception Proxy None 12. CompTIA Security+: Technologies and Tools What is the main function of a CASB (Cloud Access Security Broker)? A. To encrypt data stored in the cloud B. To provide direct network access to cloud services C. To enforce security policies between cloud users and cloud applications D. To monitor the physical security of cloud data centers None 13. CompTIA Security+: Technologies and Tools In network security, what is the primary purpose of using a honeypot? A. To serve as a decoy to detect, deflect, or study hacking attempts B. To encrypt data transmissions C. To increase network bandwidth efficiency D. To serve as a primary firewall None 14. CompTIA Security+: Technologies and Tools Which technology is essential for securing a network against Zero Day exploits? A. Antivirus software with signature-based detection B. Network-based firewall C. Behavior-based threat detection system D. Static code analysis tools None 15. CompTIA Security+: Technologies and Tools In the context of digital forensics, what is the main purpose of a write blocker? A. To prevent the deletion of data during an investigation B. To encrypt sensitive data on a hard drive C. To prevent any alterations to the data on a storage device D. To increase the speed of data recovery None 16. CompTIA Security+: Technologies and Tools What is the primary purpose of a Network Access Control NAC system? A. To manage the distribution of IP addresses B. To control access to network resources based on policies C. To encrypt data traffic on a network D. To monitor network traffic for performance issues None 17. CompTIA Security+: Technologies and Tools Which tool is used in cybersecurity to simulate attacks on a system or network to identify vulnerabilities? A. Protocol analyzer B. Vulnerability scanner C. Penetration testing tool D. Antivirus software None 18. CompTIA Security+: Technologies and Tools In cybersecurity, what is the primary function of a Next-Generation Firewall (NGFW)? A. To filter spam from email B. To provide VPN services for remote users C. To integrate intrusion prevention with traditional firewall capabilities D. To manage wireless network security None 19. CompTIA Security+: Technologies and Tools What is the primary use of a Security Assertion Markup Language (SAML)? A. To encrypt email communications B. To facilitate Single Sign-On (SSO) for web applications C. To scan for vulnerabilities in software D. To filter network traffic None 20. CompTIA Security+: Technologies and Tools In network security, what is the main function of an IDS (Intrusion Detection System)? A. To block malicious network traffic B. To monitor network traffic and alert on suspicious activities C. To encrypt data traffic D. To provide a secure user authentication mechanism None 1 out of 20 Time is Up! Time's up