Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Self Study for Comptia Security Plus

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What are Ports 20/21 used for?   FTP  
🗑
What is Port 22 used for?   Secure Shell (SSH)  
🗑
What is Port 23 used for?   Telnet  
🗑
What is Port 25 used for?   SMTP  
🗑
What is Port 53 used for?   DNS  
🗑
What is Port 69 used for?   TFTP  
🗑
What is Port 80 used for?   HTTP  
🗑
What is Port 88 used for?   Kerberos  
🗑
What is Port 110 used for?   POP3  
🗑
What is Port 143 used for?   IMAP  
🗑
What is Port 443 used for?   SSL/HTTPS  
🗑
What are Ports 161/162 used for?   SNMP  
🗑
What are Ports 137/138 used for?   NetBios  
🗑
What is Port 995 used for?   pop3s  
🗑
What is Port 1433 used for?   SQL  
🗑
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring?   Privilege Audit  
🗑
What kind of physical access device restricts access to a smaller number of individuals at one time?   Mantrap  
🗑
A Voluntary set of Standards governing encryption   Public-Key Cryptography Standards  
🗑
Protocol used to create a secure environment in a wireless network?   WEP  
🗑
Internet Server interfaces with TCP/IP at which layer of the DOD model?   Process Layer  
🗑
Which technology would allow you to establish a network connection between two LAN's using the internet?   L2TP  
🗑
Design concept which limits access to systems from the outside users while protecting users and systems inside the LAN?   DMZ  
🗑
In the Key Recovery Process, what key must be recoverable?   Previous Key  
🗑
Which component of IDS collects Data?   Sensor  
🗑
What is the process of making an operating system secure from attack called?   Hardening  
🗑
The integrity objective addresses which characteristics of information security?   Verification that information is accurate.  
🗑
Which mechanism is used by PKI to allow immediate verification of a certificates validity?   OCSP  
🗑
_________ is the equivalent of a VLAN from a physical security perspective.   Partitioning  
🗑
_________ is a Mechanism or process used to enable or disable access to a network resource based on IP address.   ACL  
🗑
Program that exists promarily to propogate itself to other systems?   Worm  
🗑
Type of Attack in which a person present themself at a location asking questions about server configurations?   Social Engineering  
🗑
123456 is an example of what?   Weak Passwords  
🗑
What is a major security problem with FTP Servers?   User Id's and Passwords are unencrypted.  
🗑
What system provides active protection and notification of security problems   IDS  
🗑
A ________ __ _________ is a process of verifying the steps taken to maintain integrity of forensic evidence?   Chain of custody  
🗑
Encryption process that uses one message to hide another?   Steganography  
🗑
What dictates how systems are used in your organization?   Use Policy  
🗑
Algorithm used to create a temporary secure session for the exchange of information?   KEA  
🗑
What security standard would be best suited for use with PDA's in an asymmetric system?   ECC  
🗑
What backup generally provides the fastest backup times?   Incremental  
🗑
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification?   Biometric  
🗑
Access control method primarily concerned with users role within the organization?   RBAC  
🗑
_____________ is the process of investigating a computer system for clues to an event?   Computer Forensics  
🗑
What is layer 7 of the OSI Model?   Application  
🗑
What is Layer 6 of the OSI Model?   Presentation  
🗑
What is Layer 5 of the OSI Model?   Session  
🗑
What is Layer 4 of the OSI Model?   Transport  
🗑
What is Layer 3 of the OSI Model?   Network  
🗑
What is Layer 2 of the OSI Model?   Datalink  
🗑
What is Layer 1 of the OSI Model?   Physical  
🗑
How Many layers does the DOD Model have   four  
🗑
An attack designed to overload a service or protocol?   Back Door  
🗑
Is 192.168.0.10 an example of a Public or Private IP address?   Private  
🗑
What protocal allows an organization to present a single tcp/ip address to the internet while utilizing private addressing on the internal LAN?   NAT  
🗑
Name an authentication method that utilizes more than one authentication process at logon?   Multi-factor  
🗑
What authentication method uses KDC to accomplish authentication for users, programs and systems?   Kerberos  
🗑
How can you break a network into smaller private networks on the same wiring without being aware of each other?   VLAN  
🗑
What technology allows for connection between two networks using a secure protocol?   Tunneling  
🗑
What part of the design goals would involve determining who owns a particular file?   Accountability  
🗑
The process of identifying the value of information or equipment in an organization?   Asset Identification  
🗑
You are asked to do a presentation of threats your organization could face from hackers, thsi is an example of?   Risk Management  
🗑
What authentication method presents credentials that are only valid during a single session?   Token  
🗑
Attack which denies authorized users access to network resources?   DOS  
🗑
Attack which uses more than one computer to attack a victim?   DDOS  
🗑
An attack carried out by inserting a computer between two systems that are communicating?   Man-in-the-middle  
🗑
________ is an attack where an attacker attempts to use an ip address to replace another system in the network.   TCP/IP hijacking  
🗑
A SMURF attack uses what protocol to conduct the attack?   ICMP  
🗑
When examining your AntiVirus software you notice the definition file missing, what type of virus probably infected your system?   Retrovirus  
🗑
Address 132.x.x.x is what Class of IP?   Class B  
🗑
Address 10.2.1.27 is an example of?   Private IP address  
🗑
Address 192.168.1.33 is what class of IP?   Class C  
🗑
Address 127.0.0.10 is what class ip Address   Class A  
🗑
System designed to allow attackers to break in   Honeypot  
🗑
A Network Sniffer and _______ can be used to monitor a network for unauthorized activity.   NIDS  
🗑
Which IDS function evaluates data collected from sensors   Analyzer  
🗑
What protocol operates on 2.4GHZ and has a bandwidth of 1 Mbps oe 2 Mbps.   802.11  
🗑
What protocol is mainly used to enable access to the internet from a mobile phone or PDA?   WAP  
🗑
A primary vulnerability of wireless environments is ______________.   Site Survey  
🗑
______________ is the process of identifying a network and its security posture.   Footprinting  
🗑
Wireless protocol considered equivilant to a wired network?   WPA2  
🗑
Process of formulating a reaction to a computer attack officially called?   Incident Response  
🗑
When an event is detected when it is happening, it is being detected in ________.   Real Time  
🗑
What is the process of disrupting an IM session called?   Jamming  
🗑
Process of making an Operating System or Network Operating System environment more secure from attacks and intruders.   Hardening  
🗑
___________ is the process of establishing a standard for security.   Baselining  
🗑
Lightweight Directory _______ Protocol   Access  
🗑
Accurate Network time and ______ are required for correct operation of Kerberos?   Key Distribution Center  
🗑
Content, URL's and Certificates are most likely to be _________ by Internet Filters.   Analyzed  
🗑
A device for securing an internal network from traffic external to the segment?   NIPS  
🗑
VPN implementations that consist of taking IPv6 security features and porting them to IPv4?   IPSEC  
🗑
A user is assigned access rights based on their function within the organization.   RBAC  
🗑
Malicious software that travels across computer networks without requiring a user to distribute the software?   WORM  
🗑
__________ would be most important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction.   Disaster Recovery Plan  
🗑
Task Based Control model   RBAC  
🗑
Workstation or system that produces a challenge string that the user provides, when prompted, in conjunction with the proper PIN.   Challenge Response Systems  
🗑
Algorithym that cannot be reversed in order to decode the data   One Way Function  
🗑
Implement a procedure to control inbound and outbound traffic on a network segment   ACL  
🗑
Freeware Forensics tools used to capture packet traffic from a network   TCPDump  
🗑
Protocol that is not recommended due to them supplying passwords and information over the network?   SNMP  
🗑
Must be installed for HTTPS to work properly on a web site?   Digital Certificate  
🗑
WEP, Wired Equivalent Privacy, is a solution to provice security on a ______________.   Wireless Local Area Network.  
🗑
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity.   PPTP  
🗑
Attack that takes advantage of computers not fully updated with the most recent OS patches.   Software Exploitation  
🗑
Secret Key Encryption is also known as   Symmetrical  
🗑
Program allows user to execute code with a higher level of security than the user should have access to.   Privilege Escalation  
🗑
The ultimate authority is called the   Root Certificate Authority  
🗑
Why are clocks used in Kerberos authentication   Ensure Tickets Expire Correctly.  
🗑
Message Authentication codes are used to provide which service   Integrity  
🗑
Installable package that includes several patches from the same vendor for various applications   Service Pack  
🗑
In order to secure web based communications, SSL uses Symmetric cryptography and ______.   Public-Key Cryptography  
🗑
What is the best method for securing a web browser?   Disable all unused features of the web browser.  
🗑
Document describing a group of expected minimum behavior in known as:   Code of Ethics  
🗑
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header.   NAT  
🗑
Backing up files and software that have changed since the last full or incremental backup.   Incremental  
🗑
Authentication process where the user can access several resources without the need for multiple credentials?   Single Sign On  
🗑
First action taken by an SSL enabled Server when a user c;icks to browse a secure page.   Server uses a digital certificate to identify itself to the browser.  
🗑
WEP uses what type of stream ciphers   RC4  
🗑
Gateway to Gateway in needed to connect users via VPN when the VPN needs be to ______ to the users.   Transparent  
🗑
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring?   Active X  
🗑
SSL operates at which layer   Transport  
🗑
An important component of good data retention policy is.   Offsite Storage.  
🗑
A person walks into a secure room behind a group of people without providing credentials to gain access is what type of activity.   Tailgating  
🗑
Connectivity required for a web server that is hosting an SSL based web site?   Port 443 Inbound  
🗑
Trust Model that would allow each user to create and sign certificates for the people they know.   Web of Trust  
🗑
Strict Environment for enforcing principles of need to know, separation of duties and least privilege.   Mandatory Access Control  
🗑
Audit Log information is best protected by Access controls that restrict usage and _________.   Recording to write once media  
🗑
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________   Trojan Horse.  
🗑
Programming Technique used to prevent buffer overflow.   Input Validation  
🗑
PGP uses PKI trust model where no certificate authority is subordinate to another   Peer to Peer  
🗑
Access Control Model that allows control determinations to be performed   MACS Method  
🗑
Person enters pretending to be a repair technician and connects a sniffer to the network, this is an example of?   Social Engineeering  
🗑
Terminology or concept that best describes MAC model.   Lattice  
🗑
Password generator that uses a challenge response method for authentication   Synchronous password generator  
🗑
Network Authentication Protocol the uses symmetric cryptography, stores a shared key for each network resource and usees Key Distribution Center?   Kerberos  
🗑
Allows an administrator to find weak passwords on a network?   Password Generator  
🗑
What is the process of deriving an encrypted value from a mathmatical process called?   hashing  
🗑
Which govt agency has the primary responsibility of establishing government standards involving cryptography for general purpose government use?   NIST  
🗑
The process of proposing a new standard or method on the internet is referred to by which acronym?   RFC  
🗑
Protocol similar to SSL, but offers the ability to use additional security protocols?   TLS  
🗑
What problem is created by centralized key generating process?   Key Transmission  
🗑
Prevention of unauthorized disclosure of keys?   Access Control  
🗑
What is the primary organization for maintaining certificates called?   CA  
🗑
What is often used to revoke a certificate?   CRL  
🗑
Which organization can be used to identify an individual for certificeate issue in a PKI environment?   LRA  
🗑
Certificate policies describe how a certificate is _________.   Used  
🗑
What is the process of storing keys for use by law enforcement caleld?   Key Escrow  
🗑
Which protocol allows a certificates authenticity to be immediately verified?   OCSP  
🗑
Which set of specifications is designed to allow XML-based programs access to PKI services?   XKMS  
🗑
An attack based on the statistics probability of a match in a key base is referred to as?   birthday attack  
🗑
What is the biggest security concern if your company uses public keys?   Integrity  
🗑
Plan or Policy that determines how to relocate to an emergency site?   Disaster Recovery Plan  
🗑
Type of Backup for the immediate recovery of a lost file?   Working Copy  
🗑
System frequently has audit files/transaction logs that can be used for recovery?   Database  
🗑
System backup that only backs up files since the last full or incremental backup?   Incremental  
🗑
System Backup that backs up everything since the las full backup.   Differential  
🗑
Which backup method uses a rotating schedule of backup media to ensure long term information storage?   Grandfather, Father, Son  
🗑
Agreement between two organizations providing mutual use of facilities in the event of emergency?   Recipricol  
🗑
The process of automatic switching from a malfunctioning system to another system.   Fail Over  
🗑
Which RAID disk Technology is not fault tollerant?   RAID 0  
🗑
An agreement that outlines performance requirements for a vendor?   SLA  
🗑
Vendor storing code for use by the customer in the event that it ceases business?   Code Escrow  
🗑
Policy that defines how computer systems may be used within an organization?   Acceptable Use Policy  
🗑
Policy which describes confidentiality of customre records?   Due Care  
🗑
Policy dictates how an organization manages certificates?   Certificate Policy  
🗑
Which process inspects procedures and verifies that they are working?   Audit  
🗑
Which access model allows users flezxibility for information sharing?   DAC  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1797603944
Popular Computers sets