CompTia Security + Post-Assessment Flashcards

1
Q

When a user suspects their computer contains evidence of unauthorized use what is the recommended first course of action?

A

Contact the computer forensics response team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT an advantage of Job rotation?

A

Increase job proficiency and productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WPA authentication uses

A

PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TACACS is usually used on which type of system?

A

UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hash algorithm creates a unique digital fingerprint called a

A

Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What application development security procedure prevents XSS, SQL injection, and XML injection attacks?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The spanning tree algorithm is used in which network design principle?

A

Loop protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When false or misleading email messages are sent to specific target users this is referred to as

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When an attacker uses a boot disk to gain access to a user’s computer which type of password attack are they using?

A

Resetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What percent of Andriod apps exhibit at least one risky behavior?

A

83

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Type Field value is for Destination Host Unreachable?

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Segmenting a network by separating devices into logical groups is done by creating

A

VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of switch attack will send forget ARP packets to a source device?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WEP keys are a minimum of _____ bits in length.

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of encryption technology is ultilized with WPA?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly