Security+ Random Questions 3 Flashcards

1
Q

What is an administrative means to prevent users from installing unapproved software on clients?

A

Have them sign an acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following methods provide fault tolerance for data storage?

A

RAID, Data backup, Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device is used to connect voice, data, pagers, networks, and almost any other conceivable application into a single telecommunications system?

A

PBX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following RAID levels is a striped disk with the dual distributed parity?

A

Level 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following functions of the incident handling process involves in-depth investigation of the incident report or incident activity to establish the priority, and threat of the incident?

A

Incident analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is used to allow or deny access to network resources?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work as network administrator for Net Perfect Inc. The company has a TCP/IP-based Windows NT network. You’re configuring a computer that will be used as a file server on the network. You have to decide the disk configuration for the computer to obtain better performance. A fault-tolerant disk configuration is not a requirement. Which of the following RAID levels will you choose to fulfill the requirement?

A

Level 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To gain more insights into the processes of a company, the company changes the positions of employees. Which of the following is an example of this practice?

A

Job rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As a security administrator, you have implemented privacy screens and password protected screen savers on all servers and client computers. Which of the following attacks are you trying to mitigate?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following protocols protects the password and data during FTP communications between a client and server?

A

SFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a network management device that sits between different network segments and allows them to communicate with another?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What form of transmission encapsulates the payload of a packet but leaves the header in its original form?

A

Transport Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following items is considered unimportant by a Dumpster diver when searching through a company’s trash bins?

A

Public website page proofs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been asked to give a speech on security to upper management. What are two primary access control methods that you should mention that are commonly combined in computer systems today?

A

RBAC, DAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the criminal practice of using social engineering over the telephone system?

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following ports must be opened on the firewall for the VPN connection using PPTP (Point-to-Point Tunneling Protocol)?

A

TCP port 1723

17
Q

Which of the following password authentication schemes enables users to access a number of applications without having to log on and/or provide a password to each application?

A

Single sign-on