Security+ Questions Flashcards
A periodic update that corrects problems in one version of a product is called a(n) _________.
Service Pack
Which device monitors network traffic in a passive manner? A. Sniffer B. IDS C. Firewall D. Web Browser
B.
What is a system that is intended or designed to be broken into by an attacker?
A. Honeypot
B. Honeybucket
C. Decoy
D. Spoofing system
E. Deleted if the employee has been terminated
A.
In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization? A. Supervisor B. Administrator C. Root D. Director
B.
You are a junior security administrator for a large bank. You have been asked to make the database servers as secure as they can be. The process of making certain that an entity (operating system, application, and so on) is as secure as it can be is known as which of the following? A. Stabilizing B. Reinforcing C. Hardening D. Toughening
C.
John is working on designing a network for the insurance company where he is employed. He wants to put the web server in an area that has somewhat less security so that other users might access it. But he does not want that to compromise the security of the rest of the network. what would be John’s best approach?
A. Place the web server in a honeynet.
B. Place the web server on the guest network segment,
C. Place the web server in a DMZ.
D. Place the web server outside his network.
C.
Tom has been instructed to find a security standard, applicable to the United States, that will help him develop appropriate security policies. He has found a standard that describes 8 principles and 14 practices that can be used to develop security policies. What standard is Tom most likely reviewing? A. ISO/IEC 27001:2013 B. NIST 800-12 C. NIST 800-14 D. ISA/IEC-62443 4
C.
Juanita is implementing a security mechanism that will fully encrypt the hard drive of laptops in her organization. The encryption and decryption will be automatic. What best describes what Juanita is implementing? A. AES B. TPM C. FDE D. SED
D.
Ahmed has been working to mitigate the threat of malware in his network. He has selected a specific vendor (Vendor ABC) for his antivirus software. He is using ABC products everywhere he needs antivirus software. Is this the correct decision? Why or why not?
A. Yes, consistency is more secure.
B. Yes, this will make the process more affordable.
C. No, this violates control diversity.
D. No, this violates vendor diversity.
D.
You are concerned about your backup files becoming infected with malware. Which of the following technologies would be best to protect your backup? A. Air-gap B. SPI firewall C. DMZ D. VLAN
A.
Which of the following devices is the most capable of providing infrastructure security? A. Hub B. Switch C. Router D. Modem
C.
Upper management has decreed that a firewall must be put in place immediately, before you site suffers an attack that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which functions?
A. Prevents unauthorized packets from entering the network
B. Allows all packets to leave the network
C. Allows all packets to enter the network
D. Eliminates collisions in the network
A.
Which device stores information about destinations in a network (choose the best answer)? A. Hub B. Modem C. Firewall D. Router
D.
As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You're preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency? A. Hub B. Switch C. Router D. PBX
B.
You've been notified that you'll soon be transferred to another site. Before you leave, you're to audit the network and document everything in use and the reason why it's in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn't a tunneling protocol but is probably used at your site by tunneling protocols for network security? A. IPSec B. PPTP C. L2TP D. L2F
A.
Which of the following can be implemented as a software or hardware solution and is usually associated with a device--a router, a firewall, NAT, and so on--used to shift a load from one device to another? A. Proxy B. Hub C. Load Balancer D. Switch
C.
Which of the following are multiport devices that improve network efficiency? A. Switches B. Modems C. Gateways D. Concentrators
A.
Which IDS system uses algorithms to analyze the traffic passing through the network? A. Arithmetical B. Algebraic C. Statistical D. Heuristic
D.
Which of the following can be used to offload the public-key encryption to a separate hardware plug-in card? A. SSL Accelerator B. Load Balancer C. Proxy Firewall D. SIEM
A.
Which of the following protections implies that information, once written, cannot be modified? A. DLP B. ROM C. WORM D. NAC
C.
In which two modes can IPSec work? A. Tunneling and Storing B. Transport and Storing C. Tunneling and Transport D. At-Rest and At-Ease
C.
With which tunnel configuration are only some (usually all incoming) requests routed and encrypted over the VPN? A. Split B. Full C. Partial D. Hybrid
A.
With which type of load balance scheduling is the first client request sent to the first group of servers, the second is sent to the second, and so on? A. Affinity B. Round-robin C. Sequential D. Progressive
B.
Which type of load balancing configuration means that more than one load balancing server is working at all times to handle the load/requests as they come in? A. Active-active B. Cooperative-sharing C. Equal Partner D. Proactive-colleague
A.
Which of the following work by decrypting encrypted traffic (SSL or TLS), inspecting it, and then re-encrypting it before sending it on to its destination? A. SSL filteres B. SSL gateways C. SSL accelerators D. SSL decryptors
D.
Which of the following is a chip that can store cryptographic keys, passwords, or certificates? A. HMP B. TPM C. MTP D. PMH
B.
Which AP-based technology can increase security dramatically by allowing or denying access based on a client's physical address? A. MAC filtering B. UTM (unified threat management) C. Round-robin D. WORM
A.
Which network devices are used to divide larger networks into smaller sections by sitting between two physical network segments and managing the flow of data between the two? A. Accelerators B. Proxies C. Bridges D. Balancers
C.
Which problem can occur when more than one bridge or switch is implemented on the network, and the devices confuse each other by leading one another to believe that a host is located on a certain segment when it is not? A. Backdoors B. Dead zones C. Collisions D. Loops
D.
Which of the following technologies is designed to combat loops created by switches and bridges and enables bridge/switch interfaces to be assigned a value that is then used to control the learning process and prevent problems? A. ESSID B. SSID C. BRD D. STP
D.
John is a network administrator for ACME company. He is trying to explain least privileges to a new technician. Which of the following is the basic premise of lest privilege?
A. Always assign responsibilities to the administrator who has the minimum permissions required.
B. When assigning permissions, give users only the permissions they need to do their work and no more.
C. Regularly review user permissions and take away one that they currently have to see if they will complain or even notice that it is missing.
D. Do not give management more permissions than users.
B.
The present method of requiring access to be strictly defined on every object is proving too cumbersome for your environment. The edict has come down from upper management that access requirements should be slightly reduced. Which access model allows users some flexibility for information-sharing purposes? A. DAC B. MAC C. RBAC D. MLAC
A.
Ahmed has been directed to ensure that LDAP on his network is secure. LDAP is an example of which of the following?
A. Directory access protocol
B. IDS
C. Tiered model application development environment
D. File server
A.
Upper management has suddenly become concerned about security. As the senior network administrator, you are asked to suggest changes that should be implemented. Which of the following access methods should you recommend if the technique to be used is one that is primarily based on preestablished access and can't be changed by users? A. MAC B. DAC C. RBAC D. Kerberos
A.
Your office administrator is being trained to perform server backups. Which access control method would be ideal for this situation? A. MAC B. DAC C. RBAC D. Security Tokens
C.
You've been assigned to mentor a junior administrator and bring her up to speed quickly. The topic you're currently explaining is authentication. Which uses a KDC to accomplish authentication for users, programs, or systems? A. CHAP B. Kerberos C. Biometrics D. Smartcards
B.
After a careful risk analysis, the value of your company's data has been increased. Accordingly, you're expected to implement authentication solutions that reflect the increased value of the data. Which of the following authentication methods uses more than one authentication process for a logon? A. Multifactor B. Biometrics C. Smartcard D. Kerberos
A.
Your company provides medical data to doctors from a worldwide database. Because of the sensitive nature of the data, it's imperative that authentication be established on each session and be valid only for that session. Which of the following authentication methods provides credentials that are valid during a single session? A. Tokens B. Certificate C. Smartcard D. Kerberos
A.
Which of the following is the term used whenever two or more parties authenticate each other? A. SSO B. Multifactor authentication C. Mutual authentication D. Tunneling
C.
You have added a new child domain to your network. As a result of this, the child has adopted all o the trust relationships with other domains in the forest that excited for its parent domain. What is responsible or this? A. LDAP access B. XML access C. Fuzzing access D. Transitive access
D.