Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Self Study for Comptia Security Plus

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show FTP  
🗑
What is Port 22 used for?   show
🗑
show Telnet  
🗑
show SMTP  
🗑
What is Port 53 used for?   show
🗑
show TFTP  
🗑
What is Port 80 used for?   show
🗑
What is Port 88 used for?   show
🗑
show POP3  
🗑
What is Port 143 used for?   show
🗑
show SSL/HTTPS  
🗑
What are Ports 161/162 used for?   show
🗑
show NetBios  
🗑
show pop3s  
🗑
What is Port 1433 used for?   show
🗑
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring?   show
🗑
show Mantrap  
🗑
A Voluntary set of Standards governing encryption   show
🗑
Protocol used to create a secure environment in a wireless network?   show
🗑
show Process Layer  
🗑
Which technology would allow you to establish a network connection between two LAN's using the internet?   show
🗑
show DMZ  
🗑
In the Key Recovery Process, what key must be recoverable?   show
🗑
Which component of IDS collects Data?   show
🗑
show Hardening  
🗑
The integrity objective addresses which characteristics of information security?   show
🗑
show OCSP  
🗑
show Partitioning  
🗑
show ACL  
🗑
Program that exists promarily to propogate itself to other systems?   show
🗑
Type of Attack in which a person present themself at a location asking questions about server configurations?   show
🗑
123456 is an example of what?   show
🗑
What is a major security problem with FTP Servers?   show
🗑
What system provides active protection and notification of security problems   show
🗑
show Chain of custody  
🗑
Encryption process that uses one message to hide another?   show
🗑
show Use Policy  
🗑
show KEA  
🗑
What security standard would be best suited for use with PDA's in an asymmetric system?   show
🗑
show Incremental  
🗑
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification?   show
🗑
Access control method primarily concerned with users role within the organization?   show
🗑
_____________ is the process of investigating a computer system for clues to an event?   show
🗑
show Application  
🗑
show Presentation  
🗑
show Session  
🗑
show Transport  
🗑
What is Layer 3 of the OSI Model?   show
🗑
What is Layer 2 of the OSI Model?   show
🗑
What is Layer 1 of the OSI Model?   show
🗑
How Many layers does the DOD Model have   show
🗑
show Back Door  
🗑
show Private  
🗑
show NAT  
🗑
show Multi-factor  
🗑
What authentication method uses KDC to accomplish authentication for users, programs and systems?   show
🗑
show VLAN  
🗑
What technology allows for connection between two networks using a secure protocol?   show
🗑
show Accountability  
🗑
show Asset Identification  
🗑
show Risk Management  
🗑
What authentication method presents credentials that are only valid during a single session?   show
🗑
show DOS  
🗑
show DDOS  
🗑
An attack carried out by inserting a computer between two systems that are communicating?   show
🗑
________ is an attack where an attacker attempts to use an ip address to replace another system in the network.   show
🗑
show ICMP  
🗑
show Retrovirus  
🗑
show Class B  
🗑
Address 10.2.1.27 is an example of?   show
🗑
Address 192.168.1.33 is what class of IP?   show
🗑
Address 127.0.0.10 is what class ip Address   show
🗑
System designed to allow attackers to break in   show
🗑
A Network Sniffer and _______ can be used to monitor a network for unauthorized activity.   show
🗑
Which IDS function evaluates data collected from sensors   show
🗑
show 802.11  
🗑
What protocol is mainly used to enable access to the internet from a mobile phone or PDA?   show
🗑
A primary vulnerability of wireless environments is ______________.   show
🗑
show Footprinting  
🗑
show WPA2  
🗑
Process of formulating a reaction to a computer attack officially called?   show
🗑
show Real Time  
🗑
show Jamming  
🗑
show Hardening  
🗑
show Baselining  
🗑
show Access  
🗑
show Key Distribution Center  
🗑
Content, URL's and Certificates are most likely to be _________ by Internet Filters.   show
🗑
show NIPS  
🗑
VPN implementations that consist of taking IPv6 security features and porting them to IPv4?   show
🗑
show RBAC  
🗑
Malicious software that travels across computer networks without requiring a user to distribute the software?   show
🗑
__________ would be most important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction.   show
🗑
Task Based Control model   show
🗑
Workstation or system that produces a challenge string that the user provides, when prompted, in conjunction with the proper PIN.   show
🗑
Algorithym that cannot be reversed in order to decode the data   show
🗑
show ACL  
🗑
show TCPDump  
🗑
Protocol that is not recommended due to them supplying passwords and information over the network?   show
🗑
Must be installed for HTTPS to work properly on a web site?   show
🗑
show Wireless Local Area Network.  
🗑
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity.   show
🗑
Attack that takes advantage of computers not fully updated with the most recent OS patches.   show
🗑
Secret Key Encryption is also known as   show
🗑
show Privilege Escalation  
🗑
show Root Certificate Authority  
🗑
show Ensure Tickets Expire Correctly.  
🗑
Message Authentication codes are used to provide which service   show
🗑
Installable package that includes several patches from the same vendor for various applications   show
🗑
show Public-Key Cryptography  
🗑
show Disable all unused features of the web browser.  
🗑
show Code of Ethics  
🗑
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header.   show
🗑
show Incremental  
🗑
Authentication process where the user can access several resources without the need for multiple credentials?   show
🗑
First action taken by an SSL enabled Server when a user c;icks to browse a secure page.   show
🗑
WEP uses what type of stream ciphers   show
🗑
Gateway to Gateway in needed to connect users via VPN when the VPN needs be to ______ to the users.   show
🗑
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring?   show
🗑
show Transport  
🗑
An important component of good data retention policy is.   show
🗑
show Tailgating  
🗑
Connectivity required for a web server that is hosting an SSL based web site?   show
🗑
show Web of Trust  
🗑
Strict Environment for enforcing principles of need to know, separation of duties and least privilege.   show
🗑
show Recording to write once media  
🗑
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________   show
🗑
show Input Validation  
🗑
PGP uses PKI trust model where no certificate authority is subordinate to another   show
🗑
Access Control Model that allows control determinations to be performed   show
🗑
show Social Engineeering  
🗑
Terminology or concept that best describes MAC model.   show
🗑
Password generator that uses a challenge response method for authentication   show
🗑
show Kerberos  
🗑
Allows an administrator to find weak passwords on a network?   show
🗑
show hashing  
🗑
show NIST  
🗑
show RFC  
🗑
show TLS  
🗑
show Key Transmission  
🗑
Prevention of unauthorized disclosure of keys?   show
🗑
What is the primary organization for maintaining certificates called?   show
🗑
What is often used to revoke a certificate?   show
🗑
show LRA  
🗑
show Used  
🗑
What is the process of storing keys for use by law enforcement caleld?   show
🗑
show OCSP  
🗑
Which set of specifications is designed to allow XML-based programs access to PKI services?   show
🗑
show birthday attack  
🗑
show Integrity  
🗑
show Disaster Recovery Plan  
🗑
Type of Backup for the immediate recovery of a lost file?   show
🗑
show Database  
🗑
show Incremental  
🗑
show Differential  
🗑
show Grandfather, Father, Son  
🗑
Agreement between two organizations providing mutual use of facilities in the event of emergency?   show
🗑
show Fail Over  
🗑
Which RAID disk Technology is not fault tollerant?   show
🗑
show SLA  
🗑
show Code Escrow  
🗑
Policy that defines how computer systems may be used within an organization?   show
🗑
Policy which describes confidentiality of customre records?   show
🗑
Policy dictates how an organization manages certificates?   show
🗑
Which process inspects procedures and verifies that they are working?   show
🗑
show DAC  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: 1797603944
Popular Computers sets