Security+ Random Questions 1 Flashcards

1
Q

Which of the following statements are true about the RSA algorithm?

A

It works with both encryption and digital signatures. It uses large integers as the basis for the process. It is an asymmetric algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company’s network. You have to configure your company’s router for it. By default, which of the following standard ports does the SSH protocol use for connection?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following choices helps to ensure confidentiality.

A

The strength of encryption.

The method used to deliver keys securely to their intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is a security feature that prevents the exploitation of various types of vulnerabilities in software applications?

A

Application Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the default port for DNS zone transfer?

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following serves as a connection point between clients on the WAN and the corporate LAN?

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is essential for cryptography without keys?

A

Cipher program, deciphering program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You want to stop malicious traffic from affecting your company’s web servers. Which of the following will help you accomplish the task?

A

NIPS. Network Intrusion Prevention System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a smart card is used to provide a system with a user’s private key, this action is often considered an act of :

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You’re in the process of implementing VLANs throughout the organization to increase security. Which of the following hardware devices is used to create security segments on a LAN?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following steps will not make a server fault tolerant?

A

Performing regular backup of the server.

Encrypting confidential data stored on the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following tools can an attacker use to perform a DNS zone transfer?

A

dig, nslookup, host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following can be used for key archival?

A

Key Escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator from the central office calls in a panic. He relays that he has heard from a reliable source that the company is about to be the target of a smurf attack, and he wants all sites to be aware of the potential problems. Which of the following options represents a type of smurf attack?

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following policies defines the usage of the company’s resources that is applied by the owner of a network.

A

Acceptable use policy

17
Q

Which of the following options best describes a bluejacking attack?

A

Involves sending unsolicited contact information to Bluetooth devices configured in discovery mode

18
Q

You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?

A

DES

19
Q

John is a forensics investigator. He has been assigned to gather forensic data from a computer running Windows Vista that is suspected of being used to hack into banks. John decides to make a copy to work with, so he attaches an external drive and uses Windows Explorer to copy all the suspect drive contents to the portable drive. Is this an appropriate forensic technique?

A

No, the operating system copying is not forensically valid. An offline bitstream copy is required.

20
Q

You are responsible for network security at a school. You find that someone has logged on as a student, but is able to access faculty resources. What is this an example of?

A

Vertical privilege escalation

21
Q

An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?

A

Multifactor

22
Q

Which of the following is a type of malicious exploit of a Web site whereby unauthorized commands are transmitted from a user that the Web site trusts?

A

Cross-site request forgery

23
Q

Jennifer, a technician, has assigned a task to implement a new network based anti-virus product. For this, she has to assess all potential problems with the new system, so that she can prepare an analysis for the CIO. What problem might occur due to false positives?

A

It is possible that a file will be mistakenly treated as a virus.

24
Q

Which of the following statements are true of Pretty Good Privacy (PGP)?

A

It offers high resistance to cryptanalysis; It compresses plaintext before encrypting.

25
Q

Lisa is a Network Security Administrator for a cloud computing vendor. What is the primary data protection security issue?

A

Ensuring that customer data is segregated

26
Q

school

A

Teenagers attempting to crack the server

27
Q

Which of the following is a part of CIA triad with which RAID is most concerned?

A

Availability

28
Q

During an investigation, there is a small fire in the lab. The fire does not damage anything, but it does trigger the sprinkler system. From a forensic point of view, what is one possible consequence of this?

A

Damaged evidence

29
Q

The act of binding a private key held by a subject to its corresponding public key is the primary function of:

A

Digital certificates