Security+ Random Questions 1 Flashcards
Which of the following statements are true about the RSA algorithm?
It works with both encryption and digital signatures. It uses large integers as the basis for the process. It is an asymmetric algorithm
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company’s network. You have to configure your company’s router for it. By default, which of the following standard ports does the SSH protocol use for connection?
22
Which of the following choices helps to ensure confidentiality.
The strength of encryption.
The method used to deliver keys securely to their intended recipient
Which of the following is a security feature that prevents the exploitation of various types of vulnerabilities in software applications?
Application Hardening
Which of the following is the default port for DNS zone transfer?
Port 53
Which of the following serves as a connection point between clients on the WAN and the corporate LAN?
VPN Concentrator
Which of the following is essential for cryptography without keys?
Cipher program, deciphering program
You want to stop malicious traffic from affecting your company’s web servers. Which of the following will help you accomplish the task?
NIPS. Network Intrusion Prevention System.
When a smart card is used to provide a system with a user’s private key, this action is often considered an act of :
Authentication
You’re in the process of implementing VLANs throughout the organization to increase security. Which of the following hardware devices is used to create security segments on a LAN?
Switch
Which of the following steps will not make a server fault tolerant?
Performing regular backup of the server.
Encrypting confidential data stored on the server.
Which of the following tools can an attacker use to perform a DNS zone transfer?
dig, nslookup, host
Which of the following can be used for key archival?
Key Escrow
An administrator from the central office calls in a panic. He relays that he has heard from a reliable source that the company is about to be the target of a smurf attack, and he wants all sites to be aware of the potential problems. Which of the following options represents a type of smurf attack?
DoS
Which design concept limits access to systems from outside users while protecting users and systems inside the LAN?
DMZ
Which of the following policies defines the usage of the company’s resources that is applied by the owner of a network.
Acceptable use policy
Which of the following options best describes a bluejacking attack?
Involves sending unsolicited contact information to Bluetooth devices configured in discovery mode
You are the Security Administrator for a consulting firm. One of your clients needs to encrypt traffic. However, he has specific requirements for the encryption algorithm. It must be a symmetric key block cipher. Which of the following should you choose for this client?
DES
John is a forensics investigator. He has been assigned to gather forensic data from a computer running Windows Vista that is suspected of being used to hack into banks. John decides to make a copy to work with, so he attaches an external drive and uses Windows Explorer to copy all the suspect drive contents to the portable drive. Is this an appropriate forensic technique?
No, the operating system copying is not forensically valid. An offline bitstream copy is required.
You are responsible for network security at a school. You find that someone has logged on as a student, but is able to access faculty resources. What is this an example of?
Vertical privilege escalation
An authentication method uses smart cards as well as usernames and passwords for authentication. Which of the following authentication methods is being referred to?
Multifactor
Which of the following is a type of malicious exploit of a Web site whereby unauthorized commands are transmitted from a user that the Web site trusts?
Cross-site request forgery
Jennifer, a technician, has assigned a task to implement a new network based anti-virus product. For this, she has to assess all potential problems with the new system, so that she can prepare an analysis for the CIO. What problem might occur due to false positives?
It is possible that a file will be mistakenly treated as a virus.
Which of the following statements are true of Pretty Good Privacy (PGP)?
It offers high resistance to cryptanalysis; It compresses plaintext before encrypting.
Lisa is a Network Security Administrator for a cloud computing vendor. What is the primary data protection security issue?
Ensuring that customer data is segregated
school
Teenagers attempting to crack the server
Which of the following is a part of CIA triad with which RAID is most concerned?
Availability
During an investigation, there is a small fire in the lab. The fire does not damage anything, but it does trigger the sprinkler system. From a forensic point of view, what is one possible consequence of this?
Damaged evidence
The act of binding a private key held by a subject to its corresponding public key is the primary function of:
Digital certificates