Security Study Flashcards
To study for and pass Security + text
A real estate company recently deployed Kerberos authentication on the network. Which of the following does Kerberos require for correct operation? (Select TWO).
A. POP-3 B. Accurate network time C. Key Distribution Center D. Extranets E. SSL/TLS
Answer: B,C
401.Which of the following are MOST likely to be analyzed by Internet filter appliances/servers? (Select THREE).401.Which of the following are MOST likely to be analyzed by Internet filter appliances/servers? (Select THREE).
A. Content B. TLSs C. Keys D. URLs E. CRLs F. Certificates
Answer: A,D,F
An administrator is selecting a device to secure an internal network segment from traffic external to the segment. Which of the following devices could be selected to provide security to the network segment?
A. NIPS
B. HIDS
C. Internet content filter
D. DMZ
Answer: A
Which of the following VPN implementations consists of taking IPv6 security features and porting them to IPv4?
A. SSL
B. IPSec
C. L2TP
D. PPTP
Answer: B
A user is assigned access rights based on the function within the organization. This is a feature of which of the following types of access control models?
A. Role Based Access Control (RBAC)
B. Rule Based Access Control (RBAC)
C. Mandatory Access Control (MAC)
D. Discretionary Access Control (DAC)
Answer: A Explanation:
Role based access control contains components of MAC (mandatory access control) and DAC (discretionary access control), and is characterized by its use of profiles. A profile is a specific role that a group of employees perform in a function and the resources they need access to. When an employee is hired he is put into a profile, and when the entire profile of workers needs more or less resources they can all be facilitated together.
Which of the following types of malicious software travels across computer networks without requiring a user to distribute the software?
A. Trojan horse
B. Worm
C. Virus
D. Logic bomb
Answer: B
Which of the following would be MOST important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction?
A. Alternate sites
B. Disaster recovery plan
C. Fault tolerant systems
D. Offsite storage
Answer: B
A task-based control model is an example of which of the following?
A. Rule Based Access Control (RBAC)
B. Role Based Access Control (RBAC)
C. Discretionary Access Control (DAC)
D. Mandatory Access Control (MAC)
Answer: B
Which of the following is often misused by spyware to collect and report a user’s activities?
A. Session cookie
B. Tracking cookie
C. Persistent cookie
D. Web bug
Answer: B
Which definition best defines what a challenge-response session is?
A. A challenge-response session is a workstation or system that produces a random login ID that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification
Number).
B. A challenge-response session is a workstation or system that produces a random challenge string that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).
C. A challenge-response session is a special hardware device used to produce random text in a cryptography system.
D. A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated.
Answer: B
Explanation:
A common authentication technique whereby an individual is prompted (the challenge) to provide some private information (the response). Most security systems that rely on smart cards are based on challenge-response. A user is given a code (the challenge) which he or she enters into the smart card. The smart card then displays a new code (the response) that the user can present to log in.
Reference: http://www.webopedia.com/TERM/C/challenge_response.html
Which of the following describes a type of algorithm that cannot be reversed in order to decode the data?
A. One Way Function
B. Symmetric
C. Asymmetric
D. Pseudorandom Number Generator (PRNG)
A
An administrator wants to implement a procedure to control inbound and outbound traffic on a network segment. Which of the following would achieve this goal?
A. HIDS
B. ACL
C. Proxy
D. NIDS
B
Which of the following freeware forensic tools is used to capture packet traffic from a network?
A. nmap
B. NESSUS
C. tcpdump
D. dd
C
When reviewing traces from an IDS, the following entries are observed:
Date Time Source IP Destination IP Port Type 10/21 0900 192.168.5.2 10.10.2.1 20 SYN 10/21 0915 192.168.5.2 10.10.2.1 21 SYN 10/21 0920 192.168.5.2 10.10.2.1 23 SYN 10/21 0930 192.168.5.2 10.10.2.1 25 SYN Which of the following is MOST likely occurring?
A. Port scanning
B. SYN Flood
C. Denial of service (DoS)
D. Expected TCP/IP traffic
A
Which of the following protocols are not recommended due to them supplying passwords and information over the network?
A. SNMP (Simple Network Management Protocol).
B. Network News Transfer Protocol (NNTP)
C. Domain Name Service (DNS)
D. Internet Control Message Protocol (ICMP)
A