Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

COMPTIA Security+ 4

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Giving users or groups only the access they need to perform their job is?   Principal of Least privilege.  
🗑
Documenting change levels and revision information is most useful for?   Disaster recovery  
🗑
What is the best IDS to monitor the entire network?   Network based IDS  
🗑
How can Active X controls be configured to prove where they originated from?   The Active X controls must be digitally signed.  
🗑
Performing a security vulnerability assessment scan on systems that a company relies upon, demonstrates what?   A commitment to protecting data and customers.  
🗑
What is the most common goal of operating system logging?   To keep a record of system usage.  
🗑
What type of authentication may be needed when a stored key and memorized password are not strong enough and additional layers of security is needed?   Multi-factor  
🗑
Part of a fire protection plan for a computer room should include what?   Procedures for an emergency shutdown of computer equipment.  
🗑
What is a common DISADVANTAGE of employing an IDS?   False positives  
🗑
What would you do to secure your FTP site?   Disable anonymous authentication  
🗑
Sessions are initiated between a TCP clients and servers. A very small buffer space exist to handle the usual rapid “hand-shaking” exchange of messages that establish the session. What kind of attack exploits this function?   SYN Attack  
🗑
During the digital signature process, hashing provides a means to verify what security requirement?   Data integrity  
🗑
What type of security mechanism can be applied to modems to better authenticate remote users?   Call back  
🗑
What tunneling protocol works only on IP networks?   PPTP  
🗑
Companies without an acceptable use policy may give their employees an expectation of what?   Privacy  
🗑
LDAP directories are arranged as?   Trees  
🗑
What is the first step before a wireless solution is implemented?   Perform a thorough site survey  
🗑
Digital signatures can be used for what?   Non-repudiation  
🗑
Despite regular system backups a significant risk still exists if?   Recovery procedures are not tested.  
🗑
What is a Dictionary Attack?   When passwords are configured using simple and meaningful things such as a pet name or birthday.  
🗑
You have identified some risks to your network. You want to implement policies, procedures and various security measures. What will your objective be?   Manage the risks so that the problem resulting from them will be minimized.  
🗑
SSL operates between which two layers of the OSI model?   Application and Transport  
🗑
How many characters should the minimum length of a password be to deter dictionary password cracks?   8  
🗑
Is the Private Key part of an X509v3 certificate?   No  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: uop2001
Popular Computers sets