Security+ Random Questions 2 Flashcards

1
Q

IPv6, in addition to having more bits allocated for each host address, also has mandatory requirements built in for which security protocol?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?

A

Configuring the settings on the Web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following techniques can mitigate tailgating attacks?

A

Mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?

A

Shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fuzzing third party software is a synonym for ____.

A

Black Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements are true about asymmetric encryption?

A

It uses a public key and a private key pair for data encryption; In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is known as a message digest?

A

Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol uses the AES (Advanced Encryption Standard) encryption to provide a secure wireless environment?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following statements best describes CHAP’s authentication procedure?

A

The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following enables users to rent equipment and run a data center?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are defined in the risk triad for an organization?

A

Assets, vulnerabilities, threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following refer to the information or message integrity?

A

Verification through checksum algorithms; Prevention of information modification during transmission; Verification through digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is the biggest security control loss with cloud computing?

A

Physical control over data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following establishes an agreement between organizations that own and operate connected IT systems to document technical requirements of the interconnection?

A

ISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a remote access protocol that supports encryption?

A

PPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which form of IPSec should you use for encryption on a LAN for internal security?

A

Transport

18
Q

Which of the following actions does the data loss prevention (DLP) technology take when an agent detects a policy violation for data of all states?

A

It creates an alert; quarantines the file to a secure location; blocks the transmission of content

19
Q

Which of the following statements are true of worms?

A

They cause harm to the network by consuming bandwidth; They mail a copy of themselves to other systems; They replicate themselves from one system to another without using a host file

20
Q

Which of the following automatically downloads and displays advertisements in the Web browser without a user’s permission?

A

Adware

21
Q

Which kind of attack is designed to overload a particular protocol or service?

A

Flood

22
Q

What backup operation will copy or back up only those files that changed since the last full backup and will reset the archive bit?

A

Incremental

23
Q

Which of the following choices can be used to describe a block cipher?

A

Symmetric Key

24
Q

Which of the following is the most secure method of authentication?

A

Biometrics

25
Q

A malicious code is sending large amount of random data to another service on the same system. Which type of attack is this?

A

Buffer overflow

26
Q

Which of the following is a message sent from a user to a certificate authority for applying a digital identity certificate?

A

CSR

27
Q

Which of the following features are provided by public cloud computing?

A

Distribution of large jobs across a flexible number of machines, Distributed storage of information, Elastic computing resources

28
Q

Which of the following radio frequencies is used by the IEEE 802.11a wireless network?

A

5.0 GHz

29
Q

Which of the following is a chronological documentation that shows who has collected and accessed each piece of evidence?

A

Chain of custody

30
Q

Which of the following is referred to the equipment which manages automated factory equipment?

A

SCADA

31
Q

Which of the following PKI elements are placed in a browser’s trusted root CA?

A

Public Key

32
Q

Which of the following keys when added to Diffie-Hellman turns it into DHE?

A

Ephemeral

33
Q

You are advising a school district on disaster recovery plans. In case a disaster affects the main IT centers of the district, they will need to be able to work from an alternate location. However, budget is an issue. Which of the following is most appropriate for this client?

A

Cold site

34
Q

Which component of an IDS collects data?

A

Sensor

35
Q

Which of the following is responsible for maintaining certificates in a public key infrastructure (PKI)?

A

Certification Authority

36
Q

Which of the following attacks involves multiple compromised systems to attack a single target?

A

DDoS attack

37
Q

In an attempt to observe hacker techniques, a security administrator configures a nonproduction network to be used as a target so he can covertly monitor network attacks. What is this type of network called?

A

Honeynet

38
Q

Your Web server crashes at exactly the point where it reaches 1 million total visits. You discover that the cause of the server crash is a malicious code. Which of the following best fits this description?

A

Logic Bomb

39
Q

Which of the following statements BEST describes VeriSign?

A

It is a certification authority.

40
Q

Which of the following is a type of scam that entices a user to disclose personal information such as social security number, bank account details, or credit card number?

A

Phishing