click below
click below
Normal Size Small Size show me how
201-Security+
Security +
Question | Answer |
---|---|
For users to authenticate with an Access Point using WEP, users have to have what? | Users have to have the correct WEP key. |
Packet sniffing can be used to obtain username and password information in clear text from what type of protocol? | FTP (File Transport Protocol). |
What should be your greatest concern when transferring files or authenticating to a FTP server? | Your greatest concern should be that the data and/or authentication information is being sent in clear text. |
Users of Instant Messaging clients are especially prone to what? | Sniffing Attacks. |
What mode does IPSec use on routers when connecting from the corporate office to the branch office? | Tunnel Mode. |
Data integrity is best achieved using what? | Message Digest (MD-5) 128 Bit Signing |
Major components of ISAKMP are? | Authentication of peers, threat management, security association, cryptographic key establishment and management. |
When a user digitally signs a document, an asymmetric algorithm is used to encrypt what? | Hash results. |
Which type of password generator is based on challenge-response mechanisms? | Asynchronous |
What protocol would an administrator use to administer, via telnet, a remote server so his password is not in clear text? | SSH |
What physical access control most adequately protects against physical piggybacking? | Man Trap |