Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Security Plus Cert

Self Study for Comptia Security Plus

QuestionAnswer
What are Ports 20/21 used for? FTP
What is Port 22 used for? Secure Shell (SSH)
What is Port 23 used for? Telnet
What is Port 25 used for? SMTP
What is Port 53 used for? DNS
What is Port 69 used for? TFTP
What is Port 80 used for? HTTP
What is Port 88 used for? Kerberos
What is Port 110 used for? POP3
What is Port 143 used for? IMAP
What is Port 443 used for? SSL/HTTPS
What are Ports 161/162 used for? SNMP
What are Ports 137/138 used for? NetBios
What is Port 995 used for? pop3s
What is Port 1433 used for? SQL
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring? Privilege Audit
What kind of physical access device restricts access to a smaller number of individuals at one time? Mantrap
A Voluntary set of Standards governing encryption Public-Key Cryptography Standards
Protocol used to create a secure environment in a wireless network? WEP
Internet Server interfaces with TCP/IP at which layer of the DOD model? Process Layer
Which technology would allow you to establish a network connection between two LAN's using the internet? L2TP
Design concept which limits access to systems from the outside users while protecting users and systems inside the LAN? DMZ
In the Key Recovery Process, what key must be recoverable? Previous Key
Which component of IDS collects Data? Sensor
What is the process of making an operating system secure from attack called? Hardening
The integrity objective addresses which characteristics of information security? Verification that information is accurate.
Which mechanism is used by PKI to allow immediate verification of a certificates validity? OCSP
_________ is the equivalent of a VLAN from a physical security perspective. Partitioning
_________ is a Mechanism or process used to enable or disable access to a network resource based on IP address. ACL
Program that exists promarily to propogate itself to other systems? Worm
Type of Attack in which a person present themself at a location asking questions about server configurations? Social Engineering
123456 is an example of what? Weak Passwords
What is a major security problem with FTP Servers? User Id's and Passwords are unencrypted.
What system provides active protection and notification of security problems IDS
A ________ __ _________ is a process of verifying the steps taken to maintain integrity of forensic evidence? Chain of custody
Encryption process that uses one message to hide another? Steganography
What dictates how systems are used in your organization? Use Policy
Algorithm used to create a temporary secure session for the exchange of information? KEA
What security standard would be best suited for use with PDA's in an asymmetric system? ECC
What backup generally provides the fastest backup times? Incremental
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification? Biometric
Access control method primarily concerned with users role within the organization? RBAC
_____________ is the process of investigating a computer system for clues to an event? Computer Forensics
What is layer 7 of the OSI Model? Application
What is Layer 6 of the OSI Model? Presentation
What is Layer 5 of the OSI Model? Session
What is Layer 4 of the OSI Model? Transport
What is Layer 3 of the OSI Model? Network
What is Layer 2 of the OSI Model? Datalink
What is Layer 1 of the OSI Model? Physical
How Many layers does the DOD Model have four
An attack designed to overload a service or protocol? Back Door
Is 192.168.0.10 an example of a Public or Private IP address? Private
What protocal allows an organization to present a single tcp/ip address to the internet while utilizing private addressing on the internal LAN? NAT
Name an authentication method that utilizes more than one authentication process at logon? Multi-factor
What authentication method uses KDC to accomplish authentication for users, programs and systems? Kerberos
How can you break a network into smaller private networks on the same wiring without being aware of each other? VLAN
What technology allows for connection between two networks using a secure protocol? Tunneling
What part of the design goals would involve determining who owns a particular file? Accountability
The process of identifying the value of information or equipment in an organization? Asset Identification
You are asked to do a presentation of threats your organization could face from hackers, thsi is an example of? Risk Management
What authentication method presents credentials that are only valid during a single session? Token
Attack which denies authorized users access to network resources? DOS
Attack which uses more than one computer to attack a victim? DDOS
An attack carried out by inserting a computer between two systems that are communicating? Man-in-the-middle
________ is an attack where an attacker attempts to use an ip address to replace another system in the network. TCP/IP hijacking
A SMURF attack uses what protocol to conduct the attack? ICMP
When examining your AntiVirus software you notice the definition file missing, what type of virus probably infected your system? Retrovirus
Address 132.x.x.x is what Class of IP? Class B
Address 10.2.1.27 is an example of? Private IP address
Address 192.168.1.33 is what class of IP? Class C
Address 127.0.0.10 is what class ip Address Class A
System designed to allow attackers to break in Honeypot
A Network Sniffer and _______ can be used to monitor a network for unauthorized activity. NIDS
Which IDS function evaluates data collected from sensors Analyzer
What protocol operates on 2.4GHZ and has a bandwidth of 1 Mbps oe 2 Mbps. 802.11
What protocol is mainly used to enable access to the internet from a mobile phone or PDA? WAP
A primary vulnerability of wireless environments is ______________. Site Survey
______________ is the process of identifying a network and its security posture. Footprinting
Wireless protocol considered equivilant to a wired network? WPA2
Process of formulating a reaction to a computer attack officially called? Incident Response
When an event is detected when it is happening, it is being detected in ________. Real Time
What is the process of disrupting an IM session called? Jamming
Process of making an Operating System or Network Operating System environment more secure from attacks and intruders. Hardening
___________ is the process of establishing a standard for security. Baselining
Lightweight Directory _______ Protocol Access
Accurate Network time and ______ are required for correct operation of Kerberos? Key Distribution Center
Content, URL's and Certificates are most likely to be _________ by Internet Filters. Analyzed
A device for securing an internal network from traffic external to the segment? NIPS
VPN implementations that consist of taking IPv6 security features and porting them to IPv4? IPSEC
A user is assigned access rights based on their function within the organization. RBAC
Malicious software that travels across computer networks without requiring a user to distribute the software? WORM
__________ would be most important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction. Disaster Recovery Plan
Task Based Control model RBAC
Workstation or system that produces a challenge string that the user provides, when prompted, in conjunction with the proper PIN. Challenge Response Systems
Algorithym that cannot be reversed in order to decode the data One Way Function
Implement a procedure to control inbound and outbound traffic on a network segment ACL
Freeware Forensics tools used to capture packet traffic from a network TCPDump
Protocol that is not recommended due to them supplying passwords and information over the network? SNMP
Must be installed for HTTPS to work properly on a web site? Digital Certificate
WEP, Wired Equivalent Privacy, is a solution to provice security on a ______________. Wireless Local Area Network.
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity. PPTP
Attack that takes advantage of computers not fully updated with the most recent OS patches. Software Exploitation
Secret Key Encryption is also known as Symmetrical
Program allows user to execute code with a higher level of security than the user should have access to. Privilege Escalation
The ultimate authority is called the Root Certificate Authority
Why are clocks used in Kerberos authentication Ensure Tickets Expire Correctly.
Message Authentication codes are used to provide which service Integrity
Installable package that includes several patches from the same vendor for various applications Service Pack
In order to secure web based communications, SSL uses Symmetric cryptography and ______. Public-Key Cryptography
What is the best method for securing a web browser? Disable all unused features of the web browser.
Document describing a group of expected minimum behavior in known as: Code of Ethics
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header. NAT
Backing up files and software that have changed since the last full or incremental backup. Incremental
Authentication process where the user can access several resources without the need for multiple credentials? Single Sign On
First action taken by an SSL enabled Server when a user c;icks to browse a secure page. Server uses a digital certificate to identify itself to the browser.
WEP uses what type of stream ciphers RC4
Gateway to Gateway in needed to connect users via VPN when the VPN needs be to ______ to the users. Transparent
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring? Active X
SSL operates at which layer Transport
An important component of good data retention policy is. Offsite Storage.
A person walks into a secure room behind a group of people without providing credentials to gain access is what type of activity. Tailgating
Connectivity required for a web server that is hosting an SSL based web site? Port 443 Inbound
Trust Model that would allow each user to create and sign certificates for the people they know. Web of Trust
Strict Environment for enforcing principles of need to know, separation of duties and least privilege. Mandatory Access Control
Audit Log information is best protected by Access controls that restrict usage and _________. Recording to write once media
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________ Trojan Horse.
Programming Technique used to prevent buffer overflow. Input Validation
PGP uses PKI trust model where no certificate authority is subordinate to another Peer to Peer
Access Control Model that allows control determinations to be performed MACS Method
Person enters pretending to be a repair technician and connects a sniffer to the network, this is an example of? Social Engineeering
Terminology or concept that best describes MAC model. Lattice
Password generator that uses a challenge response method for authentication Synchronous password generator
Network Authentication Protocol the uses symmetric cryptography, stores a shared key for each network resource and usees Key Distribution Center? Kerberos
Allows an administrator to find weak passwords on a network? Password Generator
What is the process of deriving an encrypted value from a mathmatical process called? hashing
Which govt agency has the primary responsibility of establishing government standards involving cryptography for general purpose government use? NIST
The process of proposing a new standard or method on the internet is referred to by which acronym? RFC
Protocol similar to SSL, but offers the ability to use additional security protocols? TLS
What problem is created by centralized key generating process? Key Transmission
Prevention of unauthorized disclosure of keys? Access Control
What is the primary organization for maintaining certificates called? CA
What is often used to revoke a certificate? CRL
Which organization can be used to identify an individual for certificeate issue in a PKI environment? LRA
Certificate policies describe how a certificate is _________. Used
What is the process of storing keys for use by law enforcement caleld? Key Escrow
Which protocol allows a certificates authenticity to be immediately verified? OCSP
Which set of specifications is designed to allow XML-based programs access to PKI services? XKMS
An attack based on the statistics probability of a match in a key base is referred to as? birthday attack
What is the biggest security concern if your company uses public keys? Integrity
Plan or Policy that determines how to relocate to an emergency site? Disaster Recovery Plan
Type of Backup for the immediate recovery of a lost file? Working Copy
System frequently has audit files/transaction logs that can be used for recovery? Database
System backup that only backs up files since the last full or incremental backup? Incremental
System Backup that backs up everything since the las full backup. Differential
Which backup method uses a rotating schedule of backup media to ensure long term information storage? Grandfather, Father, Son
Agreement between two organizations providing mutual use of facilities in the event of emergency? Recipricol
The process of automatic switching from a malfunctioning system to another system. Fail Over
Which RAID disk Technology is not fault tollerant? RAID 0
An agreement that outlines performance requirements for a vendor? SLA
Vendor storing code for use by the customer in the event that it ceases business? Code Escrow
Policy that defines how computer systems may be used within an organization? Acceptable Use Policy
Policy which describes confidentiality of customre records? Due Care
Policy dictates how an organization manages certificates? Certificate Policy
Which process inspects procedures and verifies that they are working? Audit
Which access model allows users flezxibility for information sharing? DAC
Created by: 1797603944