CompTia Security + Post-Assessment Flashcards
When a user suspects their computer contains evidence of unauthorized use what is the recommended first course of action?
Contact the computer forensics response team
Which of the following is NOT an advantage of Job rotation?
Increase job proficiency and productivity.
WPA authentication uses
PSK
TACACS is usually used on which type of system?
UNIX
A hash algorithm creates a unique digital fingerprint called a
Digest
What application development security procedure prevents XSS, SQL injection, and XML injection attacks?
Input validation
The spanning tree algorithm is used in which network design principle?
Loop protection
When false or misleading email messages are sent to specific target users this is referred to as
Spear phishing
When an attacker uses a boot disk to gain access to a user’s computer which type of password attack are they using?
Resetting
What percent of Andriod apps exhibit at least one risky behavior?
83
Which Type Field value is for Destination Host Unreachable?
Type 1
Segmenting a network by separating devices into logical groups is done by creating
VLANs
What type of switch attack will send forget ARP packets to a source device?
ARP poisoning
WEP keys are a minimum of _____ bits in length.
64
Which type of encryption technology is ultilized with WPA?
TKIP