Security+ Random Questions 2 Flashcards
IPv6, in addition to having more bits allocated for each host address, also has mandatory requirements built in for which security protocol?
IPSec
Which of the following actions should be taken so that the computer requires confirmation before installing an ActiveX component?
Configuring the settings on the Web browser
You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?
DMZ
Which of the following techniques can mitigate tailgating attacks?
Mantrap
Which of the following is used to prevent the electronic emissions of a computer from being used by unauthorized users?
Shielding
Fuzzing third party software is a synonym for ____.
Black Box
Which of the following statements are true about asymmetric encryption?
It uses a public key and a private key pair for data encryption; In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message.
Which of the following is known as a message digest?
Hash function
Which protocol uses the AES (Advanced Encryption Standard) encryption to provide a secure wireless environment?
WPA2
Which of the following statements best describes CHAP’s authentication procedure?
The initiator sends a logon request from the client to the server. The server sends a challenge back to the client. The challenge is encrypted and then sent back to the server. The server compares the value from the client and, if the information matches, grants authorization.
Which of the following enables users to rent equipment and run a data center?
IaaS
Which of the following are defined in the risk triad for an organization?
Assets, vulnerabilities, threats
Which of the following refer to the information or message integrity?
Verification through checksum algorithms; Prevention of information modification during transmission; Verification through digital signatures
Which of the following is the biggest security control loss with cloud computing?
Physical control over data
Which of the following establishes an agreement between organizations that own and operate connected IT systems to document technical requirements of the interconnection?
ISA
Which of the following is a remote access protocol that supports encryption?
PPP
Which form of IPSec should you use for encryption on a LAN for internal security?
Transport
Which of the following actions does the data loss prevention (DLP) technology take when an agent detects a policy violation for data of all states?
It creates an alert; quarantines the file to a secure location; blocks the transmission of content
Which of the following statements are true of worms?
They cause harm to the network by consuming bandwidth; They mail a copy of themselves to other systems; They replicate themselves from one system to another without using a host file
Which of the following automatically downloads and displays advertisements in the Web browser without a user’s permission?
Adware
Which kind of attack is designed to overload a particular protocol or service?
Flood
What backup operation will copy or back up only those files that changed since the last full backup and will reset the archive bit?
Incremental
Which of the following choices can be used to describe a block cipher?
Symmetric Key
Which of the following is the most secure method of authentication?
Biometrics