Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP?

A. WPA
B. CCMP
C. WEP
D. WPA2
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding?

A. True negative
B. True positive
C. False negative
D. False positive
Remaining cards (39)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

PT 9

QuestionAnswer
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 A. WPA
ou log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive D. False positive
Which of the port numbers listed below are used by FTP over TLS/SSL (FTPS)? (Select 2 answers) A. 20 B. 989 C. 5060 D. 21 E. 990 B. 989 E. 990
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 D. 20
he Secure Shell (SSH) protocol uses TCP port: A. 23 B. 25 C. 21 D. 22 D. 22
Which of the following answers refers to a port number assigned to the Kerberos authentication system? A. 49 B. 88 C. 1645 D. 1723 B. 88
An SNMP management station receives SNMP notifications from Agents on UDP port: A. 161 B. 137 C. 162
TACACS+ runs on TCP port: A. 389 B. 49 C. 636 D. 88 C. 636
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061 C. 5060 F. 5061
Which of the ports listed below are used by RADIUS? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 B. 1812 E. 1813
Network Time Protocol (NTP) runs on UDP port: A. 123 B. 110 C. 161 D. 137 A. 123
Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? A. 143 B. 389 C. 443 A. 143
An SNMP Agent receives requests on UDP port: A. 161 B. 137 C. 162 D. 138 A. 161
Ricky is over WiFI security for his company. Which wireless security protocol below uses TKIP? A. WPA B. CCMP C. WEP D. WPA2 A. WPA
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected setup PIN to exploit the WAP and recover the WPA2 password. What type of attack is this? A. Evil twin B. Rogue WAP C. IV attack D. WPS attack D. WPS attack
You log into the MySQL server and verify that you are currently running version 3.5.3. Based on the item shown on the image, what best describes how you should categorize this finding? A. True negative B. True positive C. False negative D. False positive D. False positive
An FTP data transfer connection is established through a TCP port number: A. 23 B. 25 C. 21 D. 20 D. 20
Which of the following ports are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) A. 989 B. 1812 C. 5060 D. 990 E. 1813 F. 5061 C. 5060 F. 5061
A network administrator has been asked to set up a VPN link on a connecting host with no dedicated VPN client application installed. Which of the following ports needs to be opened to enable this type of connection? A. 443 B. 22 C. 143 D. 3389 A. 443
Which of the following statements apply to the definition of a computer virus? (Select 3 answers) A. A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active C. A standalone malicious computer program that replicates itself over a computer network D. Can run by itself without any interaction E. Attaches itself to an application program or other executable component A self-replicating computer program containing malicious segment B. Requires its host application to be run to make the virus active E. Attaches itself to an application program or other executable component
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? A. AES B. RC4 C. 3DES D. DES A. AES
Which of the answers listed below refers to a common target of cross-site scripting (XSS)? A. Alternate sites B. Removable storage C. Physical security D. Dynamic web pages D. Dynamic web pages
Which command in MS Windows displays a table consisting of IP addresses and their resolved physical addresses? A. arp -e B. netstat -n C. nslookup D. arp -a D. arp -a
Which cryptographic attack relies on the concepts of probability theory? A. Birthday B. KPA C. Dictionary D. Brute-force A. Birthday
Which of the following is not a certificate trust model for arranging Certificate Authorities? A. Bridge CA architecture B. Hierarchical CA architecture C. Single-CA architecture D. Sub-CA architecture D. Sub-CA architecture
Which of the attack types listed below relies on the amplification effect? A. Brute-force attack B. Zero-day attack C. MITM attack D. DDoS attack D. DDoS attack
Which of the block cipher modes listed below provides both data integrity and confidentiality? A. CBC B. GCM C. ECB D. CTR B. GCM
Which of the following block cipher modes is the simplest/weakest and therefore not recommended for use? A. CBC B. GCM C. ECB D. CTR C. ECB
AES-based encryption mode implemented in WPA2 is known as: A. CCMP B. ECB C. CBC D. TKIP A. CCMP
Which of the answers listed below refers to the most common format in which Certificate Authorities (Cissue certificates? A. CER B. PEM C. DER D. P7B B. PEM
Which of the following terms illustrate(s) the security through obscurity concept? (Select all that apply) A. Code obfuscation B. Steganography C. SSID broadcast suppression D. Encryption E. Substitution ciphers A. Code obfuscation B. Steganography C. SSID broadcast suppression E. Substitution ciphers
Which of the following terms is used in conjunction with the assumption that the output of a cryptographic function should be considerably different from the corresponding plaintext input? A. Confusion B. Obfuscation C. Collision D. Diffusion A. Confusion
What is the fastest way for validating a digital certificate? A. CRL B. Key escrow C. OCSP D. CSR C. OCSP
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario? A. Cross-site request forgery B. ARP poisoning C. DNS poisoning D. Replay attack B. ARP poisoning
Examples of means that provide randomization during the encryption process include: (Select 3 answers) A. Cryptographic nonce B. Obfuscation C. Salting D. Initialization Vector (IV) E. Shimming A. Cryptographic nonce C. Salting D. Initialization Vector (IV) E. Shimming
Which of the three states of digital data requires data to be processed in an unencrypted form? A. Data-in-transit B. Data-at-rest C. Data-in-use C. Data-in-use
Which of the statements listed below describe the purpose behind collecting OSINT? (Select 3 answers) A. Disabling unnecessary ports and services B. Active reconnaissance in penetration testing C. Gaining advantage over competitors D. Application whitelisting/blacklisting E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack C. Gaining advantage over competitors E. Passive reconnaissance in penetration testing F. Preparation before launching a cyberattack
You’re tasked with configuring a friend’s SOHO router and noticed a PIN on the back of their router. What is the purpose of this PIN? A. This is a WEP PIN B. This is a WPS PIN C. This is a WPA PIN D. This is a Bluetooth PIN B. This is a WPS PIN
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a C. /all
Which of the following answers lists an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters? A. -a B. /? C. /all D. /-a C. /all
Created by: bgray8
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards