Self Study for Comptia Security Plus
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | FTP
🗑
|
||||
show | Secure Shell (SSH)
🗑
|
||||
What is Port 23 used for? | show 🗑
|
||||
show | SMTP
🗑
|
||||
What is Port 53 used for? | show 🗑
|
||||
What is Port 69 used for? | show 🗑
|
||||
What is Port 80 used for? | show 🗑
|
||||
show | Kerberos
🗑
|
||||
show | POP3
🗑
|
||||
What is Port 143 used for? | show 🗑
|
||||
show | SSL/HTTPS
🗑
|
||||
show | SNMP
🗑
|
||||
What are Ports 137/138 used for? | show 🗑
|
||||
show | pop3s
🗑
|
||||
What is Port 1433 used for? | show 🗑
|
||||
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring? | show 🗑
|
||||
What kind of physical access device restricts access to a smaller number of individuals at one time? | show 🗑
|
||||
A Voluntary set of Standards governing encryption | show 🗑
|
||||
Protocol used to create a secure environment in a wireless network? | show 🗑
|
||||
Internet Server interfaces with TCP/IP at which layer of the DOD model? | show 🗑
|
||||
Which technology would allow you to establish a network connection between two LAN's using the internet? | show 🗑
|
||||
show | DMZ
🗑
|
||||
In the Key Recovery Process, what key must be recoverable? | show 🗑
|
||||
show | Sensor
🗑
|
||||
show | Hardening
🗑
|
||||
show | Verification that information is accurate.
🗑
|
||||
Which mechanism is used by PKI to allow immediate verification of a certificates validity? | show 🗑
|
||||
_________ is the equivalent of a VLAN from a physical security perspective. | show 🗑
|
||||
show | ACL
🗑
|
||||
Program that exists promarily to propogate itself to other systems? | show 🗑
|
||||
show | Social Engineering
🗑
|
||||
show | Weak Passwords
🗑
|
||||
What is a major security problem with FTP Servers? | show 🗑
|
||||
show | IDS
🗑
|
||||
show | Chain of custody
🗑
|
||||
show | Steganography
🗑
|
||||
What dictates how systems are used in your organization? | show 🗑
|
||||
Algorithm used to create a temporary secure session for the exchange of information? | show 🗑
|
||||
show | ECC
🗑
|
||||
show | Incremental
🗑
|
||||
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification? | show 🗑
|
||||
Access control method primarily concerned with users role within the organization? | show 🗑
|
||||
show | Computer Forensics
🗑
|
||||
What is layer 7 of the OSI Model? | show 🗑
|
||||
show | Presentation
🗑
|
||||
show | Session
🗑
|
||||
show | Transport
🗑
|
||||
show | Network
🗑
|
||||
What is Layer 2 of the OSI Model? | show 🗑
|
||||
What is Layer 1 of the OSI Model? | show 🗑
|
||||
show | four
🗑
|
||||
show | Back Door
🗑
|
||||
Is 192.168.0.10 an example of a Public or Private IP address? | show 🗑
|
||||
What protocal allows an organization to present a single tcp/ip address to the internet while utilizing private addressing on the internal LAN? | show 🗑
|
||||
show | Multi-factor
🗑
|
||||
What authentication method uses KDC to accomplish authentication for users, programs and systems? | show 🗑
|
||||
show | VLAN
🗑
|
||||
show | Tunneling
🗑
|
||||
show | Accountability
🗑
|
||||
show | Asset Identification
🗑
|
||||
show | Risk Management
🗑
|
||||
show | Token
🗑
|
||||
Attack which denies authorized users access to network resources? | show 🗑
|
||||
show | DDOS
🗑
|
||||
show | Man-in-the-middle
🗑
|
||||
________ is an attack where an attacker attempts to use an ip address to replace another system in the network. | show 🗑
|
||||
A SMURF attack uses what protocol to conduct the attack? | show 🗑
|
||||
show | Retrovirus
🗑
|
||||
show | Class B
🗑
|
||||
Address 10.2.1.27 is an example of? | show 🗑
|
||||
Address 192.168.1.33 is what class of IP? | show 🗑
|
||||
show | Class A
🗑
|
||||
show | Honeypot
🗑
|
||||
show | NIDS
🗑
|
||||
show | Analyzer
🗑
|
||||
show | 802.11
🗑
|
||||
What protocol is mainly used to enable access to the internet from a mobile phone or PDA? | show 🗑
|
||||
show | Site Survey
🗑
|
||||
show | Footprinting
🗑
|
||||
show | WPA2
🗑
|
||||
show | Incident Response
🗑
|
||||
When an event is detected when it is happening, it is being detected in ________. | show 🗑
|
||||
show | Jamming
🗑
|
||||
show | Hardening
🗑
|
||||
___________ is the process of establishing a standard for security. | show 🗑
|
||||
Lightweight Directory _______ Protocol | show 🗑
|
||||
show | Key Distribution Center
🗑
|
||||
Content, URL's and Certificates are most likely to be _________ by Internet Filters. | show 🗑
|
||||
show | NIPS
🗑
|
||||
show | IPSEC
🗑
|
||||
show | RBAC
🗑
|
||||
show | WORM
🗑
|
||||
show | Disaster Recovery Plan
🗑
|
||||
Task Based Control model | show 🗑
|
||||
show | Challenge Response Systems
🗑
|
||||
show | One Way Function
🗑
|
||||
Implement a procedure to control inbound and outbound traffic on a network segment | show 🗑
|
||||
show | TCPDump
🗑
|
||||
Protocol that is not recommended due to them supplying passwords and information over the network? | show 🗑
|
||||
show | Digital Certificate
🗑
|
||||
WEP, Wired Equivalent Privacy, is a solution to provice security on a ______________. | show 🗑
|
||||
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity. | show 🗑
|
||||
show | Software Exploitation
🗑
|
||||
Secret Key Encryption is also known as | show 🗑
|
||||
show | Privilege Escalation
🗑
|
||||
show | Root Certificate Authority
🗑
|
||||
Why are clocks used in Kerberos authentication | show 🗑
|
||||
show | Integrity
🗑
|
||||
show | Service Pack
🗑
|
||||
show | Public-Key Cryptography
🗑
|
||||
What is the best method for securing a web browser? | show 🗑
|
||||
show | Code of Ethics
🗑
|
||||
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header. | show 🗑
|
||||
show | Incremental
🗑
|
||||
Authentication process where the user can access several resources without the need for multiple credentials? | show 🗑
|
||||
show | Server uses a digital certificate to identify itself to the browser.
🗑
|
||||
show | RC4
🗑
|
||||
show | Transparent
🗑
|
||||
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring? | show 🗑
|
||||
SSL operates at which layer | show 🗑
|
||||
An important component of good data retention policy is. | show 🗑
|
||||
A person walks into a secure room behind a group of people without providing credentials to gain access is what type of activity. | show 🗑
|
||||
Connectivity required for a web server that is hosting an SSL based web site? | show 🗑
|
||||
Trust Model that would allow each user to create and sign certificates for the people they know. | show 🗑
|
||||
Strict Environment for enforcing principles of need to know, separation of duties and least privilege. | show 🗑
|
||||
Audit Log information is best protected by Access controls that restrict usage and _________. | show 🗑
|
||||
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________ | show 🗑
|
||||
show | Input Validation
🗑
|
||||
PGP uses PKI trust model where no certificate authority is subordinate to another | show 🗑
|
||||
Access Control Model that allows control determinations to be performed | show 🗑
|
||||
show | Social Engineeering
🗑
|
||||
Terminology or concept that best describes MAC model. | show 🗑
|
||||
Password generator that uses a challenge response method for authentication | show 🗑
|
||||
show | Kerberos
🗑
|
||||
show | Password Generator
🗑
|
||||
What is the process of deriving an encrypted value from a mathmatical process called? | show 🗑
|
||||
Which govt agency has the primary responsibility of establishing government standards involving cryptography for general purpose government use? | show 🗑
|
||||
The process of proposing a new standard or method on the internet is referred to by which acronym? | show 🗑
|
||||
Protocol similar to SSL, but offers the ability to use additional security protocols? | show 🗑
|
||||
What problem is created by centralized key generating process? | show 🗑
|
||||
Prevention of unauthorized disclosure of keys? | show 🗑
|
||||
show | CA
🗑
|
||||
What is often used to revoke a certificate? | show 🗑
|
||||
show | LRA
🗑
|
||||
show | Used
🗑
|
||||
show | Key Escrow
🗑
|
||||
Which protocol allows a certificates authenticity to be immediately verified? | show 🗑
|
||||
show | XKMS
🗑
|
||||
An attack based on the statistics probability of a match in a key base is referred to as? | show 🗑
|
||||
What is the biggest security concern if your company uses public keys? | show 🗑
|
||||
show | Disaster Recovery Plan
🗑
|
||||
show | Working Copy
🗑
|
||||
System frequently has audit files/transaction logs that can be used for recovery? | show 🗑
|
||||
show | Incremental
🗑
|
||||
System Backup that backs up everything since the las full backup. | show 🗑
|
||||
show | Grandfather, Father, Son
🗑
|
||||
show | Recipricol
🗑
|
||||
The process of automatic switching from a malfunctioning system to another system. | show 🗑
|
||||
show | RAID 0
🗑
|
||||
show | SLA
🗑
|
||||
Vendor storing code for use by the customer in the event that it ceases business? | show 🗑
|
||||
Policy that defines how computer systems may be used within an organization? | show 🗑
|
||||
Policy which describes confidentiality of customre records? | show 🗑
|
||||
Policy dictates how an organization manages certificates? | show 🗑
|
||||
Which process inspects procedures and verifies that they are working? | show 🗑
|
||||
Which access model allows users flezxibility for information sharing? | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
1797603944
Popular Computers sets