click below
click below
Normal Size Small Size show me how
Security Plus 2
COMPTIA Security+ 2
| Question | Answer |
|---|---|
| A VPN using IPSec in the tunnel mode will provide encryption for what? | Payload and message header. |
| After an Operating System install, what should you do to the administrator and guest account? | Rename the admin account and disable the guest account. |
| Controlling access to information systems and associated networks is necessary for the preservation of their what? | Confidentiality, integrity, and availability. |
| What correctly identifies some of the contents of a users X.509 certificate? | User’s public key, CA distinguished name, and the type of symmetric algorithm used for encryption. |
| System administrators and hackers use what technique to review network traffic to determine what services are running? | Sniffer |
| The action of determining which Operating System is installed on a system by analyzing it’s response to certain network traffic is called? | Finger printing |
| What encryption scheme relies on both the sender and receiver to use different keys to encrypt and decrypt messages? | Asymmetric |
| A user wants to send an e-mail and ensure that the message is not tampered with while in transit. What feature of modern cryptographic systems will facilitate this need? | Integrity |
| Non-repudiation is generally used to do what? | Prevent the sender or the receiver from denying that the communication between them has occurred. |
| Why are unique user ID’s critical in the review of audit trails? | To establish individual accountability. |
| You are the first to arrive at a crime scene. An investigator and crime scene technician arrive afterwards. What does the crime scene technician need to do | Tag, bag, and inventory evidence. |
| You are the first to arrive at a crime scene where a hacker is accessing unauthorized data on a file server from across the network. What should you do? | Detach the network cable from the server to prevent the hacker from accessing further data. |
| When hosting a web server with CGI scripts, the directories for public view should have what type of permissions? | The execute permission. |
| An FTP bounce attack is generally used to what? | Establish a connection between the FTP server and another computer. |
| What determines if a user is presented with a dialog box prior to downloading an Active X component? | User’s browser settings. |
| What is a common type of attack on web servers? | Buffer overflow |
| What kind of encryption does Block Cipher use? | Symmetric |
| What kind of attack are hashed passwords vulnerable to? | Dictionary or brute force |
| What network mapping tool uses ICMP? | Ping scanner |
| What would be the most effective hardware device in preventing network traffic sniffing? | Use switches NOT hubs. |
| When configuring high-end switches that support VLANs you should be concerned about what two main security risks? | MAC Addresses can be spoofed, and the VLAN Trunking Protocol (VTP) can be attacked so that all VTP clients erase their valid VLAN information databases. |
| What are TCP wrappers used for? | Controlling access to selected services. |
| What is required to use S/MIME? | Digital certificate |
| What strategy should be used when configuring the rules for a secure firewall? | Default deny or deny-by-default. |
| Data integrity is what? | A method of securing traffic that ensures all data is sequenced and numbered. |
| What is not a characteristic of DEN (Directory Enabled Networking)? | It is inferior to SNMP. |
| The most common form of authentication is the use of what? | Passwords |
| The goal of TCP hijacking is what? | Taking over legitimate TCP connection |
| When implementing Kerberos authentication, what factors must be accounted for? | Kerberos requires a centrally managed database of all user and resource passwords. |
| NetBus and Back Orifice are each considered an example of what? | Illicit server |
| A virus that hides itself by intercepting disk access requests is? | Stealth |
| What encryption key is used to verify a digital signature? | The signer’s public key. |
| What protocol is most similar to SSLv3? | TLS (Transport Layer Security) |
| Which RRAS industry standard authentication protocol could be used to encrypt passwords? | CHAP |
| Discouraging employees from misusing company e-mail is best handled by? | Creating a network security policy. |
| An administrator wants to set up a system for the internal network that will examine all packets for known attack signatures. What type of system will be setup? | Networked base IDS. |