click below
click below
Normal Size Small Size show me how
Security Plus 4
COMPTIA Security+ 4
| Question | Answer |
|---|---|
| Giving users or groups only the access they need to perform their job is? | Principal of Least privilege. |
| Documenting change levels and revision information is most useful for? | Disaster recovery |
| What is the best IDS to monitor the entire network? | Network based IDS |
| How can Active X controls be configured to prove where they originated from? | The Active X controls must be digitally signed. |
| Performing a security vulnerability assessment scan on systems that a company relies upon, demonstrates what? | A commitment to protecting data and customers. |
| What is the most common goal of operating system logging? | To keep a record of system usage. |
| What type of authentication may be needed when a stored key and memorized password are not strong enough and additional layers of security is needed? | Multi-factor |
| Part of a fire protection plan for a computer room should include what? | Procedures for an emergency shutdown of computer equipment. |
| What is a common DISADVANTAGE of employing an IDS? | False positives |
| What would you do to secure your FTP site? | Disable anonymous authentication |
| Sessions are initiated between a TCP clients and servers. A very small buffer space exist to handle the usual rapid “hand-shaking” exchange of messages that establish the session. What kind of attack exploits this function? | SYN Attack |
| During the digital signature process, hashing provides a means to verify what security requirement? | Data integrity |
| What type of security mechanism can be applied to modems to better authenticate remote users? | Call back |
| What tunneling protocol works only on IP networks? | PPTP |
| Companies without an acceptable use policy may give their employees an expectation of what? | Privacy |
| LDAP directories are arranged as? | Trees |
| What is the first step before a wireless solution is implemented? | Perform a thorough site survey |
| Digital signatures can be used for what? | Non-repudiation |
| Despite regular system backups a significant risk still exists if? | Recovery procedures are not tested. |
| What is a Dictionary Attack? | When passwords are configured using simple and meaningful things such as a pet name or birthday. |
| You have identified some risks to your network. You want to implement policies, procedures and various security measures. What will your objective be? | Manage the risks so that the problem resulting from them will be minimized. |
| SSL operates between which two layers of the OSI model? | Application and Transport |
| How many characters should the minimum length of a password be to deter dictionary password cracks? | 8 |
| Is the Private Key part of an X509v3 certificate? | No |