COMPTIA Security+ Q&A
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | Users have to have the correct WEP key.
🗑
|
||||
show | FTP (File Transport Protocol).
🗑
|
||||
show | Your greatest concern should be that the data and/or authentication information is being sent in clear text.
🗑
|
||||
Users of Instant Messaging clients are especially prone to what? | show 🗑
|
||||
What mode does IPSec use on routers when connecting from the corporate office to the branch office? | show 🗑
|
||||
Data integrity is best achieved using what? | show 🗑
|
||||
Major components of ISAKMP are? | show 🗑
|
||||
show | Hash results
🗑
|
||||
show | Asynchronous
🗑
|
||||
What protocol would an administrator use to administer, via telnet, a remote server so his password is not in clear text? | show 🗑
|
||||
What physical access control most adequately protects against physical piggybacking? | show 🗑
|
||||
A recent audit shows that a user logged into a server with their user account and executed a program. The user performed activities only available to an administrator. What is an example of this type of attack? | show 🗑
|
||||
An attack where a different message, using the same hash function as the original message, produces a common message digest is known as a what? | show 🗑
|
||||
show | Fiber-Optic
🗑
|
||||
The flow of packets traveling through routers can be controlled by implementing what type of security mechanism? | show 🗑
|
||||
What is of great importance when considering physical security? | show 🗑
|
||||
show | WAP (Wireless Access Point)
🗑
|
||||
An Intrusion detection system typically consists of two parts, a console and what? | show 🗑
|
||||
show | A vulnerability scanner
🗑
|
||||
Missing audit log entries most seriously affects an organization’s ability to do what? | show 🗑
|
||||
Following a disaster, while returning to the original site from an alternate site, the first process to resume at the original site is what? | show 🗑
|
||||
An organization’s primary purpose in conducting risk analysis in dealing with computer security is what? | show 🗑
|
||||
The primary drawback to using shared storage clustering for high availability and disaster recovery is what? | show 🗑
|
||||
show | Disable application services other than DNS.
🗑
|
||||
show | Ordinary/non-secure IP packets inside of encrypted/secure IP packet.
🗑
|
||||
What is the primary DISADVANTAGE of a third party relay? | show 🗑
|
||||
show | You can get system-wide permissions with it.
🗑
|
||||
show | Each object has an owner which has full control over the object.
🗑
|
||||
show | Client, gateway, original server.
🗑
|
||||
Sensitive data traffic can be confined to workstations on a specific subnet using privilege policy based tables in what type of hardware? | show 🗑
|
||||
show | SLE (Single Loss Expectancy)
🗑
|
||||
show | A penetration test.
🗑
|
||||
show | Authentication Header (AH)Encapsulation Security Payload (ESP)
🗑
|
||||
show | A firewall can not inspect encrypted traffic.
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
uop2001
Popular Computers sets