Send a link to your students to track their progress
505 Terms
1
New cards
What are the non-overlapping channels for 802.11g/n?
Channels 1, 6, and 11
2
New cards
Does the S/MIME protocol use certificates?
yes
3
New cards
Which two ports does FTP use?
ports 20 and 21
4
New cards
Which technique attempts to predict the likelihood that a threat will occur and assigns monetary values in the event a loss occurs?
quantitative risk analysis
5
New cards
Which IPSec mode is used to create a VPN between two gateways?
tunnel mode
6
New cards
What is the most likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network?
The computer is infected with a botnet.
7
New cards
What does the acronym IDS denote?
Intrusion Detection System
8
New cards
Which encryption method is more scalable?
Asymmetric Encryption
9
New cards
What is the purpose of DLP?
Data Loss Prevention (DLP) is a network system that monitors data on computers to ensure the data is not deleted or removed.
10
New cards
Which port number does NTP use?
port 123
11
New cards
Which backup method backs up every file on the server each time it is run?
A full backup
12
New cards
What is the term for an unauthorized access that a network-based intrusion detection system (NIDS) fails to detect?
missed detection or false negative
13
New cards
Which alternate computing facility is the least expensive to maintain before a disaster occurs?
a cold site
14
New cards
What are the three basic questions answered by the chain of custody?
who controlled the evidence, who secured the evidence, and who obtained the evidence
15
New cards
Which term refers to the assurance that data has not been altered in transmission?
data integrity
16
New cards
What is the purpose of Platform as a Service (PaaS) in cloud computing?
It provides not only a virtualized deployment platform but also a value-added solution stack and an application development platform.
17
New cards
What does the acronym FCoE denote?
Fibre Channel over Ethernet
18
New cards
At which OSI layer does IP Security (IPSec) operate?
the Network layer (Layer 3)
19
New cards
What is meant by the term hardening?
tightening control using security policies to increase system security
20
New cards
What do you use to control traffic from the Internet to the LAN (local area network) by controlling the packets that are allowed to enter the LAN?
a firewall
21
New cards
According to CompTIA's Security+ examination blueprint, what are the four types of logs that you should monitor for mitigation and deterrence?
event logs, audit logs, security logs, and access logs
22
New cards
What are the two types of eye scans?
iris scans and retinal scans
23
New cards
What are alternate terms for cross-site request forgery (XSRF)?
session riding or one-click attack
24
New cards
What block cipher and key size (in bits) are used by the Clipper Chip?
The Skipjack block cipher and an 80-bit key length
25
New cards
Why is GPS tracking often disabled?
It is considered a security threat. As long as GPS tracking is enabled and the mobile device is powered on, the device (and possibly its user) can be located.
26
New cards
What is the name of the process for removing only the incriminating data from the audit logs?
scrubbing
27
New cards
What ensures that a user is who he claims to be?
identification
28
New cards
Which port number does SSH use?
port 22
29
New cards
On what does the Pretty Good Privacy (PGP) mail standard rely?
a web of trust
30
New cards
Which information do routers use to forward packets to their destinations?
the network address and subnet mask
31
New cards
Which account should you rename immediately after installing a new operating system (OS) to harden the OS?
the administrator account
32
New cards
Which error condition arises because data is not checked before input to ensure that it has an appropriate length?
buffer overflow errors
33
New cards
What is the component included with Windows Vista and higher operating systems that encrypts an entire volume with 128-bit encryption to prevent information from being read if the drive is lost or stolen?
BitLocker
34
New cards
What is the purpose of administrative controls?
to implement security policies based on procedures, standards, and guidelines
35
New cards
Which fire suppression method, formerly used to suppress fires involving electrical equipment or liquids, has been discontinued?
halon gas
36
New cards
On which standard is Lightweight Directory Access Protocol (LDAP) based
X.500
37
New cards
Which public-key algorithm was the first to allow two users to exchange a secret key over an insecure medium without any prior secret keys?
Diffie-Hellman
38
New cards
Which authentication protocol separates authentication and authorization: TACACS+ or RADIUS?
TACACS+
39
New cards
What was the first public-key algorithm ever used?
Diffie-Hellman
40
New cards
Which tool should you use to retrieve the contents of a GET request: a protocol analyzer or port scanner?
a protocol analyzer
41
New cards
Which type of controls is implemented to secure physical access to an object, such as a building, a room, or a computer?
a physical or operational control
42
New cards
Which protocol provides connectionless integrity, data origin authentication, replay protection, and confidentiality (encryption) using Authentication Header (AH) and Encapsulating Security Payload (ESP)?
Internet Protocol Security (IPSec)
43
New cards
What does the acronym MTTR denote?
mean time to repair
44
New cards
What is an entity that issues and manages certificates?
certification authority (CA)
45
New cards
According to CompTIA's Security+ examination blueprint, what are the three listed reporting techniques for mitigation and deterrence?
alarms, alerts, and trends
46
New cards
Which term is used when the amount of work that a computer has to do is divided between two or more computers so that more work is performed in the same amount of time?
load balancing
47
New cards
Which type of attack searches long lists of words for a particular language to match them to an encrypted password?
dictionary attack
48
New cards
What is spimming?
an instance of spam sent over an instant message application
49
New cards
What is a proxy server?
a server that caches and filters content
50
New cards
Which type of authentication combines two or more authentication methods, like something that a person knows (such as a password), something that a person owns (such as a smart card), and a characteristic about the person (such as a fingerprint)?
multi-factor authentication
51
New cards
Which services are usually provided by all-in-one security devices?
URL filtering, content inspection, and malware inspection
52
New cards
Which directory protocol does Directory-Enabled Networking (DEN) use?
Lightweight Directory Access Protocol (LDAP)
53
New cards
What is a honeypot?
a decoy system in your network installed to lure potential intruders away from legitimate systems
54
New cards
What is the term for a potential opening in network security that a hacker can exploit to attack a network?
a vulnerability
55
New cards
What is the most significant misuse of cookies?
misuse of personal data
56
New cards
Which setting ensures that repeated attempts to guess a user's password is not possible beyond the configured value?
account lockout
57
New cards
What is a smurf attack?
an attack where a ping request is sent to a broadcast network address with the aim of overwhelming the system
58
New cards
Is the Message Digest 5 (MD5) algorithm used with symmetric or asymmetric key algorithms?
asymmetric
59
New cards
What is the purpose of Infrastructure as a Service (IaaS) in cloud computing?
It provides computer and server infrastructure, typically through a virtualization environment.
60
New cards
What is war driving?
the act of discovering unprotected wireless network by driving around with a laptop
61
New cards
What does the acronym DAC denote?
discretionary access control
62
New cards
Which audit category will audit all instances of users exercising their rights?
the Audit Privilege Use audit category
63
New cards
Which intrusion detection system (IDS) watches for intrusions that match a known identity?
signature-based IDS
64
New cards
Which security protocol was designed as an interim solution to replace WEP without requiring the replacement of legacy hardware?
Temporal Key Integrity Protocol (TKIP)
65
New cards
What is the recommended action when the cost of the safeguard exceeds the amount of the potential loss for a given risk?
to accept the risk
66
New cards
What is a VPN concentrator?
a device that creates a virtual private network (VPN)
67
New cards
Does each VLAN create its own collision domain or its own broadcast domain?
broadcast domain
68
New cards
What is a warm site?
an alternate computing facility with telecommunications equipment but no computers
69
New cards
What does the acronym POP denote?
Post Office Protocol
70
New cards
Which type of cryptography relies more on physics, rather than mathematics, as a key aspect of its security model?
quantum cryptography
71
New cards
What is the main difference between an IDS and an IPS?
An IDS detects intrusions. An IPS prevents intrusions.
72
New cards
What is the term for an authorized access that a network-based intrusion detection system (NIDS) incorrectly detects as an attack?
false positive
73
New cards
What is another name for RAID 5?
disk striping with parity
74
New cards
What is the key size, in bits, of the Data Encryption Standard (DES)?
56
75
New cards
What is another name for RAID 0?
disk striping
76
New cards
What are the two advantages of single sign-on (SSO)?
convenience and centralized administration
77
New cards
Which type of virus can change its signature to avoid detection?
polymorphic
78
New cards
Which type of attack is characterized by an attacker who takes over the session of an already authenticated user?
hijacking
79
New cards
Which term refers to voice communication over a network?
telephony or Voice over IP (VoIP)
80
New cards
Which type of disaster recovery site provides very little fault tolerance for the primary data center and relies on backups to bring the data center back online?
cold site
81
New cards
Which protocol does the Enterprise mode of WPA and WPA2 use for authentication?
Extensible Authentication Protocol (EAP)
82
New cards
Which type of cipher encrypts data in fixed-size blocks?
block
83
New cards
What is the name for a hole in the security of an application deliberately left in place by a designer?
back door
84
New cards
What is most commonly used to provide proof of a message's origin?
a digital signature
85
New cards
What is the key length used by a one-time pad?
The key length is the same length as the message that is to be encrypted. The message length determines the key length.
86
New cards
Which audit category tracks all attempts to log on with a domain user account when enabled on domain controllers?
the Audit Account Logon Events audit category
87
New cards
Would a certification authority (CA) revoke a certificate if the certificate owner's public key were exposed?
no
88
New cards
What are four common service models of cloud computing?
Infrastructure as a service (IaaS), Monitoring as a service (MaaS), Platform as a service (PaaS), Software as a service (SaaS)
89
New cards
Who can change a resource's category in a mandatory access control environment?
administrators only
90
New cards
Which access control model is based on the data's owner implementing and administering access control?
Discretionary Access Control (DAC)
91
New cards
Which type of controls dictates how security policies are implemented to fulfill the company's security goals?
an administrative or management control
92
New cards
What is phishing?
when an e-mail request for confidential information that appears to originate from a bank or other trusted institution is received
93
New cards
What is Protected Extensible Authentication Protocol (PEAP)?
a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel
94
New cards
What is incident management?
the activities of an organization to identify, analyze, and correct risks as they are identified
95
New cards
What is the purpose of anti-spam applications or filters?
to prevent unsolicited e-mail
96
New cards
What is the name for a fix that addresses a specific Windows system problem or set of problems?
hotfix
97
New cards
Where is information on cancelled certificates retained?
in the certificate revocation list (CRL)
98
New cards
What does the acronym RBAC denote?
role-based access control
99
New cards
What is a service level agreement (SLA)?
a contract between a network service provider and a customer that specifies the services the network service provider will furnish
100
New cards
Why is the location of an alternate site important?
You do not want it to be affected by the same disaster as your primary facility.