Comp TIA Security + (Study guide)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

made by hannah w

Last updated 2:16 PM on 4/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards


You are configuring a fleet of Windows 7 laptops for traveling employees, some of whom prefer using USB mice. It is critical that the machines are as secure as possible. What should you configure? 


A. Disable USB ports.
B. Require USB device encryption.
C. Enable and configure the Windows firewall.
D. Install and configure antivirus software.
E. Enable a power management scheme.

B,C,D

2
New cards


Michel, an IT security expert, grants permissions to folders on a file server to allow Marketing users to modify Marketing documents. Which information security goal has been satisfied?

Confidentiality

3
New cards


Which of the following organizes the appropriate identification methods from least secure to most secure?

Username and password, smartcard, retinal scan

4
New cards


Ahmid is a software developer for a high-tech company. He creates a program that connects to a chat room and waits to receive commands that will gather personal user information. Ahmid embeds this program into an AVI file for a current popular movie and shares this file on a P2P file-sharing network. Once Ahmid's program is activated as people download and watch the movie, what will be created?

Botnet

5
New cards

You are the founder of Acme Data Mining. The business focuses on retrieving relevant consumer habits from various sources, and that data is then sold to retailers. Because of the amount of data that must be processed, you must implement the fastest possible solution.

Which type of technology should you implement?

NoSQL

6
New cards

What type of password attack involves the use of a dictionary file and modifications of the words in the dictionary file?

Hybrid attack

7
New cards


You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?

Availability

8
New cards

Which TCP/IP protocol is designed to synchronize time between computers?

NTP

9
New cards


Which of the following standards must authenticate computing devices before allowing network access?

IEEE 802.1x

10
New cards


Which of the following are true regarding backdoors? 


A. They are malicious code.
B. They allow remote users access to TCP port 25.
C. They are made accessible through rootkits.
D. They provide access to the Windows root account.

A,C

11
New cards
12
New cards
13
New cards
14
New cards
15
New cards
16
New cards
17
New cards
18
New cards
19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards