Self Study for Comptia Security Plus
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
show | FTP
🗑
|
||||
What is Port 22 used for? | show 🗑
|
||||
show | Telnet
🗑
|
||||
show | SMTP
🗑
|
||||
What is Port 53 used for? | show 🗑
|
||||
show | TFTP
🗑
|
||||
What is Port 80 used for? | show 🗑
|
||||
What is Port 88 used for? | show 🗑
|
||||
show | POP3
🗑
|
||||
What is Port 143 used for? | show 🗑
|
||||
show | SSL/HTTPS
🗑
|
||||
What are Ports 161/162 used for? | show 🗑
|
||||
show | NetBios
🗑
|
||||
show | pop3s
🗑
|
||||
What is Port 1433 used for? | show 🗑
|
||||
What type of audit can be used to determine if accounts have been established correctly and verify that privilege creep isn't occurring? | show 🗑
|
||||
show | Mantrap
🗑
|
||||
A Voluntary set of Standards governing encryption | show 🗑
|
||||
Protocol used to create a secure environment in a wireless network? | show 🗑
|
||||
show | Process Layer
🗑
|
||||
Which technology would allow you to establish a network connection between two LAN's using the internet? | show 🗑
|
||||
show | DMZ
🗑
|
||||
In the Key Recovery Process, what key must be recoverable? | show 🗑
|
||||
Which component of IDS collects Data? | show 🗑
|
||||
show | Hardening
🗑
|
||||
The integrity objective addresses which characteristics of information security? | show 🗑
|
||||
show | OCSP
🗑
|
||||
show | Partitioning
🗑
|
||||
show | ACL
🗑
|
||||
Program that exists promarily to propogate itself to other systems? | show 🗑
|
||||
Type of Attack in which a person present themself at a location asking questions about server configurations? | show 🗑
|
||||
123456 is an example of what? | show 🗑
|
||||
What is a major security problem with FTP Servers? | show 🗑
|
||||
What system provides active protection and notification of security problems | show 🗑
|
||||
show | Chain of custody
🗑
|
||||
Encryption process that uses one message to hide another? | show 🗑
|
||||
show | Use Policy
🗑
|
||||
show | KEA
🗑
|
||||
What security standard would be best suited for use with PDA's in an asymmetric system? | show 🗑
|
||||
show | Incremental
🗑
|
||||
You are assigned a laptop with fingerprint scanner as part of your logon process, this is an example of what type of identity verification? | show 🗑
|
||||
Access control method primarily concerned with users role within the organization? | show 🗑
|
||||
_____________ is the process of investigating a computer system for clues to an event? | show 🗑
|
||||
show | Application
🗑
|
||||
show | Presentation
🗑
|
||||
show | Session
🗑
|
||||
show | Transport
🗑
|
||||
What is Layer 3 of the OSI Model? | show 🗑
|
||||
What is Layer 2 of the OSI Model? | show 🗑
|
||||
What is Layer 1 of the OSI Model? | show 🗑
|
||||
How Many layers does the DOD Model have | show 🗑
|
||||
show | Back Door
🗑
|
||||
show | Private
🗑
|
||||
show | NAT
🗑
|
||||
show | Multi-factor
🗑
|
||||
What authentication method uses KDC to accomplish authentication for users, programs and systems? | show 🗑
|
||||
show | VLAN
🗑
|
||||
What technology allows for connection between two networks using a secure protocol? | show 🗑
|
||||
show | Accountability
🗑
|
||||
show | Asset Identification
🗑
|
||||
show | Risk Management
🗑
|
||||
What authentication method presents credentials that are only valid during a single session? | show 🗑
|
||||
show | DOS
🗑
|
||||
show | DDOS
🗑
|
||||
An attack carried out by inserting a computer between two systems that are communicating? | show 🗑
|
||||
________ is an attack where an attacker attempts to use an ip address to replace another system in the network. | show 🗑
|
||||
show | ICMP
🗑
|
||||
show | Retrovirus
🗑
|
||||
show | Class B
🗑
|
||||
Address 10.2.1.27 is an example of? | show 🗑
|
||||
Address 192.168.1.33 is what class of IP? | show 🗑
|
||||
Address 127.0.0.10 is what class ip Address | show 🗑
|
||||
System designed to allow attackers to break in | show 🗑
|
||||
A Network Sniffer and _______ can be used to monitor a network for unauthorized activity. | show 🗑
|
||||
Which IDS function evaluates data collected from sensors | show 🗑
|
||||
show | 802.11
🗑
|
||||
What protocol is mainly used to enable access to the internet from a mobile phone or PDA? | show 🗑
|
||||
A primary vulnerability of wireless environments is ______________. | show 🗑
|
||||
show | Footprinting
🗑
|
||||
show | WPA2
🗑
|
||||
Process of formulating a reaction to a computer attack officially called? | show 🗑
|
||||
show | Real Time
🗑
|
||||
show | Jamming
🗑
|
||||
show | Hardening
🗑
|
||||
show | Baselining
🗑
|
||||
show | Access
🗑
|
||||
show | Key Distribution Center
🗑
|
||||
Content, URL's and Certificates are most likely to be _________ by Internet Filters. | show 🗑
|
||||
show | NIPS
🗑
|
||||
VPN implementations that consist of taking IPv6 security features and porting them to IPv4? | show 🗑
|
||||
show | RBAC
🗑
|
||||
Malicious software that travels across computer networks without requiring a user to distribute the software? | show 🗑
|
||||
__________ would be most important to have to ensure that a company will be able to recover in case of severe environmental trouble or destruction. | show 🗑
|
||||
Task Based Control model | show 🗑
|
||||
Workstation or system that produces a challenge string that the user provides, when prompted, in conjunction with the proper PIN. | show 🗑
|
||||
Algorithym that cannot be reversed in order to decode the data | show 🗑
|
||||
show | ACL
🗑
|
||||
show | TCPDump
🗑
|
||||
Protocol that is not recommended due to them supplying passwords and information over the network? | show 🗑
|
||||
Must be installed for HTTPS to work properly on a web site? | show 🗑
|
||||
show | Wireless Local Area Network.
🗑
|
||||
Tunneling Protocol that can only works on IP networks because it requires IP coonnectivity. | show 🗑
|
||||
Attack that takes advantage of computers not fully updated with the most recent OS patches. | show 🗑
|
||||
Secret Key Encryption is also known as | show 🗑
|
||||
show | Privilege Escalation
🗑
|
||||
show | Root Certificate Authority
🗑
|
||||
show | Ensure Tickets Expire Correctly.
🗑
|
||||
Message Authentication codes are used to provide which service | show 🗑
|
||||
Installable package that includes several patches from the same vendor for various applications | show 🗑
|
||||
show | Public-Key Cryptography
🗑
|
||||
show | Disable all unused features of the web browser.
🗑
|
||||
show | Code of Ethics
🗑
|
||||
________ could cause communication errors with ipsec VPN tunnel because of changes made to the IP header. | show 🗑
|
||||
show | Incremental
🗑
|
||||
Authentication process where the user can access several resources without the need for multiple credentials? | show 🗑
|
||||
First action taken by an SSL enabled Server when a user c;icks to browse a secure page. | show 🗑
|
||||
WEP uses what type of stream ciphers | show 🗑
|
||||
Gateway to Gateway in needed to connect users via VPN when the VPN needs be to ______ to the users. | show 🗑
|
||||
A Web page becomes unresponsive whenever the embedded calendar control is used. What type of vulnerability is occurring? | show 🗑
|
||||
show | Transport
🗑
|
||||
An important component of good data retention policy is. | show 🗑
|
||||
show | Tailgating
🗑
|
||||
Connectivity required for a web server that is hosting an SSL based web site? | show 🗑
|
||||
show | Web of Trust
🗑
|
||||
Strict Environment for enforcing principles of need to know, separation of duties and least privilege. | show 🗑
|
||||
show | Recording to write once media
🗑
|
||||
Malicious code that enters a computer by means of freely distributed game that is installed and played is known as _____________ | show 🗑
|
||||
show | Input Validation
🗑
|
||||
PGP uses PKI trust model where no certificate authority is subordinate to another | show 🗑
|
||||
Access Control Model that allows control determinations to be performed | show 🗑
|
||||
show | Social Engineeering
🗑
|
||||
Terminology or concept that best describes MAC model. | show 🗑
|
||||
Password generator that uses a challenge response method for authentication | show 🗑
|
||||
show | Kerberos
🗑
|
||||
Allows an administrator to find weak passwords on a network? | show 🗑
|
||||
show | hashing
🗑
|
||||
show | NIST
🗑
|
||||
show | RFC
🗑
|
||||
show | TLS
🗑
|
||||
show | Key Transmission
🗑
|
||||
Prevention of unauthorized disclosure of keys? | show 🗑
|
||||
What is the primary organization for maintaining certificates called? | show 🗑
|
||||
What is often used to revoke a certificate? | show 🗑
|
||||
show | LRA
🗑
|
||||
show | Used
🗑
|
||||
What is the process of storing keys for use by law enforcement caleld? | show 🗑
|
||||
show | OCSP
🗑
|
||||
Which set of specifications is designed to allow XML-based programs access to PKI services? | show 🗑
|
||||
show | birthday attack
🗑
|
||||
show | Integrity
🗑
|
||||
show | Disaster Recovery Plan
🗑
|
||||
Type of Backup for the immediate recovery of a lost file? | show 🗑
|
||||
show | Database
🗑
|
||||
show | Incremental
🗑
|
||||
show | Differential
🗑
|
||||
show | Grandfather, Father, Son
🗑
|
||||
Agreement between two organizations providing mutual use of facilities in the event of emergency? | show 🗑
|
||||
show | Fail Over
🗑
|
||||
Which RAID disk Technology is not fault tollerant? | show 🗑
|
||||
show | SLA
🗑
|
||||
show | Code Escrow
🗑
|
||||
Policy that defines how computer systems may be used within an organization? | show 🗑
|
||||
Policy which describes confidentiality of customre records? | show 🗑
|
||||
Policy dictates how an organization manages certificates? | show 🗑
|
||||
Which process inspects procedures and verifies that they are working? | show 🗑
|
||||
show | DAC
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
1797603944
Popular Computers sets