Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

COMPTIA Security+ Q&A

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show Users have to have the correct WEP key.  
🗑
show FTP (File Transport Protocol).  
🗑
show Your greatest concern should be that the data and/or authentication information is being sent in clear text.  
🗑
Users of Instant Messaging clients are especially prone to what?   show
🗑
What mode does IPSec use on routers when connecting from the corporate office to the branch office?   show
🗑
Data integrity is best achieved using what?   show
🗑
Major components of ISAKMP are?   show
🗑
show Hash results  
🗑
show Asynchronous  
🗑
What protocol would an administrator use to administer, via telnet, a remote server so his password is not in clear text?   show
🗑
What physical access control most adequately protects against physical piggybacking?   show
🗑
A recent audit shows that a user logged into a server with their user account and executed a program. The user performed activities only available to an administrator. What is an example of this type of attack?   show
🗑
An attack where a different message, using the same hash function as the original message, produces a common message digest is known as a what?   show
🗑
show Fiber-Optic  
🗑
The flow of packets traveling through routers can be controlled by implementing what type of security mechanism?   show
🗑
What is of great importance when considering physical security?   show
🗑
show WAP (Wireless Access Point)  
🗑
An Intrusion detection system typically consists of two parts, a console and what?   show
🗑
show A vulnerability scanner  
🗑
Missing audit log entries most seriously affects an organization’s ability to do what?   show
🗑
Following a disaster, while returning to the original site from an alternate site, the first process to resume at the original site is what?   show
🗑
An organization’s primary purpose in conducting risk analysis in dealing with computer security is what?   show
🗑
The primary drawback to using shared storage clustering for high availability and disaster recovery is what?   show
🗑
show Disable application services other than DNS.  
🗑
show Ordinary/non-secure IP packets inside of encrypted/secure IP packet.  
🗑
What is the primary DISADVANTAGE of a third party relay?   show
🗑
show You can get system-wide permissions with it.  
🗑
show Each object has an owner which has full control over the object.  
🗑
show Client, gateway, original server.  
🗑
Sensitive data traffic can be confined to workstations on a specific subnet using privilege policy based tables in what type of hardware?   show
🗑
show SLE (Single Loss Expectancy)  
🗑
show A penetration test.  
🗑
show Authentication Header (AH)Encapsulation Security Payload (ESP)  
🗑
show A firewall can not inspect encrypted traffic.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: uop2001
Popular Computers sets