220-1102 Security Flashcards

1
Q

What is a small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. Also known as a mantrap.

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are devices that store some unique information that a user carries on their person?

A

Security tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device provides a one-time use code that is used to authenticate a user in addition to a username and password?

A

RSA Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common RSA Token in hard token form?

A

Key Fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a fancy term for a metal detector?

A

Magnetometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kinds of drives can support access control lists (ACLs)

A

Drives with modern file systems such as NTFS, APFS, HFS+, and ext3/4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a soft token?

A

Authenticator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a Windows domain, a computer running Windows Server is configured as a what?

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a domain controller store?

A

domain accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can a login script do for a domain account?

A

Map network drives, place an information box on the screen, run applications and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In active directory, what enables you to organize users and computers by function, location, permission and more?

A

Organizational units (OUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do roaming profiles in active directory provide the user?

A

Each time the user logs into a new machine, their home folder data can move with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between active directory groups, security groups, and user groups?

A

Active directory groups and security groups are the same term. They are more powerful and more centrally managed than user groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an interlinked area of physical and logical security that includes: physical security, authentication, users, groups, and security policies?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption standard does WPA2 use?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which wifi security addresses usability and security issues that affected its predecessor by including encryption to protect data of users on open (public) networks?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which encryption method was introduced in WPA and is supported by WPA2, but lessens security?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which authentication protocol enables a central authorization server to pass out keys that individual clients can present to access resources as needed?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is malware that replicates and activates by attaching to executable programs or the drives boot sector?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What kind of virus live inside the system’s boot partition and activate their malicious code before the security software can start?

A

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is it called when a virus does something like corrupting data or stealing private information?

A

Activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What kind of malware does not need to attach itself to other programs to replicate?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a piece of malware that appears or pretends to do one thing while, at the same time, doing something evil?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What malware logs the user’s keystrokes and makes that information available to the attacker?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which malware takes advantage of very low-level operating system functions to hide itself?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 7 steps for malware removal

A
  1. Investigate and verify malware symptoms
  2. Quarantine infected systems
  3. Disable System Restore in Windows
  4. Remediate infected systems
    A. Update anti-malware software
    B. Scanning and removal techniques
  5. Schedule scans and run updates
  6. Enable System Restore and create a restore point in Windows
  7. Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When attempting to remediate an infected system, what do you do if you restore from a backup and the system is still infected?

A

Perform a clean install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CompTIA considers removing a virus as part of what step?

A

Remediation

29
Q

What is a fake wireless access point configured to mimic the traits of a legitimate device and network?

A

Evil Twin

30
Q

What attack is when the attacker injects malicious code into the Web app in order to trick it into sending things it shouldn’t to other users of the Web site?

A

Cross-site scripting (XSS)

31
Q

Which Windows account has almost as much power as an Administrator?

A

Power User

32
Q

Which NTFS setting controls which NTFS permissions apply to newly created files or subfolders?

A

Inheritance

33
Q

Which variation of Bitlocker can encrypt removable drives?

A

Bitlocker to go

34
Q

Which Windows feature opens a dialogue box when removable media is inserted into the computer, providing options based on what Windows finds on the drive, including starting the autorun application.

A

AutoPlay

35
Q

Which Windows feature enables Windows to look for and read a file called autorun.inf immediately after a removable media device (optical disk or thumb drive) is inserted and automatically run whatever program that file lists?

A

Autorun

36
Q

How do third party drive disposal services guarantee they have destroyed drives?

A

By issuing a certificate of destruction/recycling

37
Q

What are phyiscal destruction techniques?

A

drilling, shredding, degaussing and incineration.

38
Q

What security setting enables an administrator to set rules about whether packets should be sent or received based on the source or destination IP address?

A

IP filtering

39
Q

Which security setting enables you to open an incoming connection to one computer automatically based on a specific outgoing connection?

A

Port triggering

40
Q

Which security setting puts any system within the specified IP addresses outside the protection of the firewall, opening all ports and enabling all incoming traffic?

A

Screened subnet

41
Q

Why should you change the SSID of a WAP?

A

The default SSID gives away important clues about the manufacturer and model of an access point

42
Q

which shutdown option has the system restart instead of shutting down?

A

/r

43
Q

In the command prompt, what does the F1 key do?

A

rebuilds the last command one letter at a time

44
Q

In the command prompt, what does the F3 do?

A

rebuilds the entire command at once

45
Q

How do you cycle through the history of your previous commands in command prompt?

A

Press the up arrow to see your previous commands. Press the right arrow to add the options

46
Q

What is a deviation from established standards, specifications or requirements?

A

Non-compliance

47
Q

Which AAA technology
- Encrypts the entire payload of the access-request packet
- is Primarily used for device administration
- Separates authentication and Authorization?

A

TACACS+

48
Q

Which AAA technology
- is Primarily used for network access
- Combines authentication and authorization
- Encrypts only the password in the access-request packet

A

RADIUS

49
Q

Which AAA technology is a completely open standard developed by the IETF? It is partially encrypted and uses UDP ports 1812 and 1813.

A

RADIUS

50
Q

What was developed as a proprietary protocol by Cisco but has been released as an “open” description so other companies can implement it? It is fully encrypted and runs on TCP port 49

A

TACACS+

51
Q

Which Wifi security standard utilizes AES-GCMP?

A

WPA3

52
Q

What malware makes copies of itself by injecting itself as extra code added to the end of executable programs?

A

Virus

53
Q

What kind of attack:
- Exploits the trust a user’s web browser has in a website
- A malicious script is injected into a trusted website
- The users browser executes attacker’s script

A

XSS

54
Q

What kind of attack is when an attacker injects malicious code into a web app in order to trick it into sending things it should’t to other users of the Web Site.

A

Cross-Site Scripting (XSS)

55
Q

What are the three different ways you can run an application as a administrator in windows?

A
  • right click on an application icon and select run as administrator
  • In the Windows start menu, press and hold control + shift keys and left-click on an application icon
  • Launch windows run dialog box (windows logo key + R) type in the applications name and press control + shift + enter
56
Q

in NTFS, does a folder copied from one location to another retain its original permissions or inherets permissions of its new parent folder?

A

parent folder

57
Q

What is the correct syntax for applying read-only attributes to a file?

A

attrib +R [drive:] [path] [filename]

58
Q

Which user group in Windows (Win 7 and before) had rights and permission that allowed its members to perform specific administrator-level tasks?

A

Power Users

59
Q

In Windows, does a file moved on the same volume keep original permissions or inherits new permissions?

A

keeps original

60
Q

In Windows, does a file moved to a different volume keep original permissions or inherits new permissions?

A

Inherits new permissions

61
Q

What allows Windows to automatically execute code contained on a newly mounted storage media?

A

AutoRun

62
Q

What is a system component that displays a dialog box containing applicable options for newly mounted storage media?

A

AutoPlay

63
Q

What is quick format often referred to as?

A

High-level format

64
Q

What simplifies networking by allowing devices to dynamically join a network, autoconfigure and learn about the presence and capabilities of other devices?

A

UPnP

65
Q

What is referred to as zero-configuration networking?

A

UPnP

66
Q

What is application software the selectively blocks access to websites?

A

Content Filter

67
Q

What two types of VPNs allows a device to connect to the company network over an untrusted network?

A

Remote Access and Client-to-site

68
Q

What software
- Gives permanent remote access
- Access is based on a local password
- A Windows tool used for connecting remotely to the user’s own computer

A

RDP