Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Self Study for Comptia Security Plus

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show FTP  
🗑
show Secure Shell (SSH)  
🗑
What is Port 23 used for?   show
🗑
show SMTP  
🗑
What is Port 53 used for?   show
🗑
What is Port 69 used for?   show
🗑
What is Port 80 used for?   show
🗑
show Kerberos  
🗑
show POP3  
🗑
What is Port 143 used for?   show
🗑
show SSL/HTTPS  
🗑
show SNMP  
🗑
What are Ports 137/138 used for?   show
🗑
show pop3s  
🗑
What is Port 1433 used for?   show
🗑
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring?   show
🗑
What kind of physical access device restricts access to a smaller number of individuals at one time?   show
🗑
A Voluntary set of Standards governing encryption   show
🗑
Protocol used to create a secure environment in a wireless network?   show
🗑
Internet Server interfaces with TCP/IP at which layer of the DOD model?   show
🗑
Which technology would allow you to establish a network connection between two LAN's using the internet?   show
🗑
show DMZ  
🗑
In the Key Recovery Process, what key must be recoverable?   show
🗑
show Sensor  
🗑
show Hardening  
🗑
show Verification that information is accurate.  
🗑
Which mechanism is used by PKI to allow immediate verification of a certificates validity?   show
🗑
_________ is the equivalent of a VLAN from a physical security perspective.   show
🗑
show ACL  
🗑
Program that exists promarily to propogate itself to other systems?   show
🗑
show Social Engineering  
🗑
show Weak Passwords  
🗑
What is a major security problem with FTP Servers?   show
🗑
show IDS  
🗑
show Chain of custody  
🗑
show Steganography  
🗑
What dictates how systems are used in your organization?   show
🗑
Algorithm used to create a temporary secure session for the exchange of information?   show
🗑
show ECC  
🗑
show Incremental  
🗑
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification?   show
🗑
Access control method primarily concerned with users role within the organization?   show
🗑
show Computer Forensics  
🗑
What is layer 7 of the OSI Model?   show
🗑
show Presentation  
🗑
show Session  
🗑
show Transport  
🗑
show Network  
🗑
What is Layer 2 of the OSI Model?   show
🗑
What is Layer 1 of the OSI Model?   show
🗑
show four  
🗑
show Back Door  
🗑
Is 192.168.0.10 an example of a Public or Private IP address?   show
🗑
What protocal allows an organization to present a single tcp/ip address to the internet while utilizing private addressing on the internal LAN?   show
🗑
show Multi-factor  
🗑
What authentication method uses KDC to accomplish authentication for users, programs and systems?   show
🗑
show VLAN  
🗑
show Tunneling  
🗑
show Accountability  
🗑
show Asset Identification  
🗑
show Risk Management  
🗑
show Token  
🗑
Attack which denies authorized users access to network resources?   show
🗑
show DDOS  
🗑
show Man-in-the-middle  
🗑
________ is an attack where an attacker attempts to use an ip address to replace another system in the network.   show
🗑
A SMURF attack uses what protocol to conduct the attack?   show
🗑
show Retrovirus  
🗑
show Class B  
🗑
Address 10.2.1.27 is an example of?   show
🗑
Address 192.168.1.33 is what class of IP?   show
🗑
show Class A  
🗑
show Honeypot  
🗑
show NIDS  
🗑
show Analyzer  
🗑
show 802.11  
🗑
What protocol is mainly used to enable access to the internet from a mobile phone or PDA?   show
🗑
show Site Survey  
🗑
show Footprinting  
🗑
show WPA2  
🗑
show Incident Response  
🗑
When an event is detected when it is happening, it is being detected in ________.   show
🗑
show Jamming  
🗑
show Hardening  
🗑
___________ is the process of establishing a standard for security.   show
🗑
Lightweight Directory _______ Protocol   show
🗑
show Key Distribution Center  
🗑
Content, URL's and Certificates are most likely to be _________ by Internet Filters.   show
🗑
show NIPS  
🗑
show IPSEC  
🗑
show RBAC  
🗑
show WORM  
🗑
show Disaster Recovery Plan  
🗑
Task Based Control model   show
🗑
show Challenge Response Systems  
🗑
show One Way Function  
🗑
Implement a procedure to control inbound and outbound traffic on a network segment   show
🗑
show TCPDump  
🗑
Protocol that is not recommended due to them supplying passwords and information over the network?   show
🗑
show Digital Certificate  
🗑
WEP, Wired Equivalent Privacy, is a solution to provice security on a ______________.   show
🗑
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity.   show
🗑
show Software Exploitation  
🗑
Secret Key Encryption is also known as   show
🗑
show Privilege Escalation  
🗑
show Root Certificate Authority  
🗑
Why are clocks used in Kerberos authentication   show
🗑
show Integrity  
🗑
show Service Pack  
🗑
show Public-Key Cryptography  
🗑
What is the best method for securing a web browser?   show
🗑
show Code of Ethics  
🗑
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header.   show
🗑
show Incremental  
🗑
Authentication process where the user can access several resources without the need for multiple credentials?   show
🗑
show Server uses a digital certificate to identify itself to the browser.  
🗑
show RC4  
🗑
show Transparent  
🗑
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring?   show
🗑
SSL operates at which layer   show
🗑
An important component of good data retention policy is.   show
🗑
A person walks into a secure room behind a group of people without providing credentials to gain access is what type of activity.   show
🗑
Connectivity required for a web server that is hosting an SSL based web site?   show
🗑
Trust Model that would allow each user to create and sign certificates for the people they know.   show
🗑
Strict Environment for enforcing principles of need to know, separation of duties and least privilege.   show
🗑
Audit Log information is best protected by Access controls that restrict usage and _________.   show
🗑
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________   show
🗑
show Input Validation  
🗑
PGP uses PKI trust model where no certificate authority is subordinate to another   show
🗑
Access Control Model that allows control determinations to be performed   show
🗑
show Social Engineeering  
🗑
Terminology or concept that best describes MAC model.   show
🗑
Password generator that uses a challenge response method for authentication   show
🗑
show Kerberos  
🗑
show Password Generator  
🗑
What is the process of deriving an encrypted value from a mathmatical process called?   show
🗑
Which govt agency has the primary responsibility of establishing government standards involving cryptography for general purpose government use?   show
🗑
The process of proposing a new standard or method on the internet is referred to by which acronym?   show
🗑
Protocol similar to SSL, but offers the ability to use additional security protocols?   show
🗑
What problem is created by centralized key generating process?   show
🗑
Prevention of unauthorized disclosure of keys?   show
🗑
show CA  
🗑
What is often used to revoke a certificate?   show
🗑
show LRA  
🗑
show Used  
🗑
show Key Escrow  
🗑
Which protocol allows a certificates authenticity to be immediately verified?   show
🗑
show XKMS  
🗑
An attack based on the statistics probability of a match in a key base is referred to as?   show
🗑
What is the biggest security concern if your company uses public keys?   show
🗑
show Disaster Recovery Plan  
🗑
show Working Copy  
🗑
System frequently has audit files/transaction logs that can be used for recovery?   show
🗑
show Incremental  
🗑
System Backup that backs up everything since the las full backup.   show
🗑
show Grandfather, Father, Son  
🗑
show Recipricol  
🗑
The process of automatic switching from a malfunctioning system to another system.   show
🗑
show RAID 0  
🗑
show SLA  
🗑
Vendor storing code for use by the customer in the event that it ceases business?   show
🗑
Policy that defines how computer systems may be used within an organization?   show
🗑
Policy which describes confidentiality of customre records?   show
🗑
Policy dictates how an organization manages certificates?   show
🗑
Which process inspects procedures and verifies that they are working?   show
🗑
Which access model allows users flezxibility for information sharing?   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1797603944
Popular Computers sets