Security+ Random Questions 1 Flashcards
Which of the following statements are true about the RSA algorithm?
It works with both encryption and digital signatures. It uses large integers as the basis for the process. It is an asymmetric algorithm
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company’s network. You have to configure your company’s router for it. By default, which of the following standard ports does the SSH protocol use for connection?
22
Which of the following choices helps to ensure confidentiality.
The strength of encryption.
The method used to deliver keys securely to their intended recipient
Which of the following is a security feature that prevents the exploitation of various types of vulnerabilities in software applications?
Application Hardening
Which of the following is the default port for DNS zone transfer?
Port 53
Which of the following serves as a connection point between clients on the WAN and the corporate LAN?
VPN Concentrator
Which of the following is essential for cryptography without keys?
Cipher program, deciphering program
You want to stop malicious traffic from affecting your company’s web servers. Which of the following will help you accomplish the task?
NIPS. Network Intrusion Prevention System.
When a smart card is used to provide a system with a user’s private key, this action is often considered an act of :
Authentication
You’re in the process of implementing VLANs throughout the organization to increase security. Which of the following hardware devices is used to create security segments on a LAN?
Switch
Which of the following steps will not make a server fault tolerant?
Performing regular backup of the server.
Encrypting confidential data stored on the server.
Which of the following tools can an attacker use to perform a DNS zone transfer?
dig, nslookup, host
Which of the following can be used for key archival?
Key Escrow
An administrator from the central office calls in a panic. He relays that he has heard from a reliable source that the company is about to be the target of a smurf attack, and he wants all sites to be aware of the potential problems. Which of the following options represents a type of smurf attack?
DoS
Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?
DMZ