Security+ K1 Flashcards
Your company has decided to implement a virtual private network (VPN), which will be used by remote employees to access internal network resources. Which two protocols could you use?
Point to Point Tunneling Protocol; creates a virtual internet connection so that networks can use the internet as their WAN link. 128 Bit Encryption. Faster.
Layer Two Tunneling Protocol; is an enhancement of PPTP and Cisco’s Layer 2 Forwarding tunneling protocols and operates at Data Link Layer. L2TP uses UDP for sending packets as well as for maintaining the connection. IPSec is used in conjunction with L2TP for encryption of that data. UDP. 256 Bit Encryption. Safer.
Which attack involves the use of a promiscuous mode for data analysis?
Packet Sniffing; Packet sniffers monitor the data passing through the network by using promiscuous mode.
The new security plan for your organization states that all data on your servers must be classified to ensure appropriate access controls are implemented. Which statements are true of information classification?
Data Classification refers to assigning security labels to information asset
A data owner must determine the information classification of an asset
The two primary classes of data classification deal with military institutions and commercial organizations.
As the security administrator for your company, you are primarily concerned with protecting corporate assets. Currently, you are working to ensure confidentiality for corporate data. Which activity is not covered under this objective?
Treason.
Which threat actor type can be characterized by having an unsophisticated skill level, using widely available tools, and being often motivated by the need that they can prove that they can do it?
Script Kiddies
After troubleshooting an issue on a Windows computer, the IT technician determines that the computer has been infected by a platform-independent virus that was written in an application’s language and is capable of infecting any files using that language. Which virus is present?
Macro Virus
Macro viruses are programs written in Word Basic, Visual Basic, or VBScript. Macro viruses are platform-independent and pose a major threat because their underlying language is simple, so they are easy to develop. Macro viruses can infect files that are written in the same language as the macro virus is written. They do not rely on the size of the packet. The ability of macro viruses to move from one operating system to the other allows them to spread more effectively than other types of viruses. Macro viruses are typically used with Microsoft Office products.
You discover that malware has affected many of your companies computers. The malware is activated remotely. What kind of malware is this?
Botnet
A user notifies you that a software application displays advertisements while the application is executing. Of which security threat is this an example?
Adware