Security+ Random Questions 2 Flashcards
IPv6, in addition to having more bits allocated for each host address, also has mandatory requirements built in for which security protocol?
IPSec
Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?
Configuring the settings on the Web browser
You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?
DMZ
Which of the following techniques can mitigate tailgating attacks?
Mantrap
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Shielding
Fuzzing third party software is a synonym for ____.
Black Box
Which of the following statements are true about asymmetric encryption?
It uses a public key and a private key pair for data encryption; In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.
Which of the following is known as a message digest?
Hash function
Which protocol uses the AES (Advanced Encryption Standard) encryption to provide a secure wireless environment?
WPA2
Which of the following statements best describes CHAP’s authentication procedure?
The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants authorization.
Which of the following enables users to rent equipment and run a data center?
IaaS
Which of the following are defined in the risk triad for an organization?
Assets, vulnerabilities, threats
Which of the following refer to the information or message integrity?
Verification through checksum algorithms; Prevention of information modification during transmission; Verification through digital signatures
Which of the following is the biggest security control loss with cloud computing?
Physical control over data
Which of the following establishes an agreement between organizations that own and operate connected IT systems to document technical requirements of the interconnection?
ISA
Which of the following is a remote access protocol that supports encryption?
PPP