Shared Flashcard Set

Details

Security+
Security+ Actualtest questions v36.0
30
Computer Networking
Professional
10/03/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
Which of the following is the BEST approach to perform risk mitigation of user access control
rights?
A. Conduct surveys and rank the results.
B. Perform routine user permission reviews.
C. Implement periodic vulnerability scanning.
D. Disable user accounts that have not been used within the last two weeks.
Definition
B. Perform routine user permission reviews.
Term
Which of the following devices is BEST suited for servers that need to store private keys?
A. Hardware security module
B. Hardened network firewall
C. Solid state disk drive
D. Hardened host firewall
Definition
A. Hardware security module
Term
All of the following are valid cryptographic hash functions EXCEPT:
A. RIPEMD.
B. RC4.
C. SHA-512.
D. MD4.
Definition
B. RC4.
Term
In regards to secure coding practices, why is input validation important?
A. It mitigates buffer overflow attacks.
B. It makes the code more readable.
C. It provides an application configuration baseline.
D. It meets gray box testing standards.
Definition
A. It mitigates buffer overflow attacks.
Term
Which of the following would be used when a higher level of security is desired for encryption key
storage?
A. TACACS+
B. L2TP
C. LDAP
D. TPM
Definition
D. TPM
Term
A security administrator needs to determine which system a particular user is trying to login to at
various times of the day. Which of the following log types would the administrator check?
A. Firewall
B. Application
C. IDS
D. Security
Definition
D. Security
Term
Which of the following MUST be updated immediately when an employee is terminated to prevent
unauthorized access?
A. Registration
B. CA
C. CRL
D. Recovery agent
Definition
C. CRL
Term
Employee badges are encoded with a private encryption key and specific personal information.
The encoding is then used to provide access to the network. Which of the following describes this
access control type?
A. Smartcard
B. Token
C. Discretionary access control
D. Mandatory access contro
Definition
A. Smartcard
Term
Which of the following devices would MOST likely have a DMZ interface?
A. Firewall
B. Switch
C. Load balancer
D. Proxy
Definition
A. Firewall
Term
Which of the following application security testing techniques is implemented when an automated
system generates random input data?
A. Fuzzing
B. XSRF
C. Hardening
D. Input validation
Definition
A. Fuzzing
Term
Which of the following can be used by a security administrator to successfully recover a user’s
forgotten password on a password protected file?
Definition
C. Brute force
Term
A security administrator wants to check user password complexity. Which of the following is the
BEST tool to use?
A. Password history
B. Password logging
C. Password cracker
D. Password hashing
Definition
C. Password cracker
Term
Certificates are used for: (Select TWO).
A. Client authentication.
B. WEP encryption.
C. Access control lists.
D. Code signing.
E. Password hashing.
Definition
A. Client authentication.
D. Code signing.
Term
Which of the following is a hardware based encryption device?
A. EFS
B. TrueCrypt
C. TPM
D. SLE
Definition
C. TPM
Term
Which of the following BEST describes a protective countermeasure for SQL injection?
A. Eliminating cross-site scripting vulnerabilities
B. Installing an IDS to monitor network traffic
C. Validating user input in web applications
D. Placing a firewall between the Internet and database servers
Definition
C. Validating user input in web applications
Term
Which of the following MOST interferes with network-based detection techniques?
A. Mime-encoding
B. SSL
C. FTP
D. Anonymous email accounts
Definition
B. SSL
Term
A certificate authority takes which of the following actions in PKI?
A. Signs and verifies all infrastructure messages
B. Issues and signs all private keys
C. Publishes key escrow lists to CRLs
D. Issues and signs all root certificates
Definition
D. Issues and signs all root certificates
Term
Use of a smart card to authenticate remote servers remains MOST susceptible to which of the
following attacks?
A. Malicious code on the local system
B. Shoulder surfing
C. Brute force certificate cracking
D. Distributed dictionary attacks
Definition
A. Malicious code on the local system
Term
Separation of duties is often implemented between developers and administrators in order to
CompTIA JK0-018 Exam
"Pass Any Exam. Any Time." - www.actualtests.com 7
separate which of the following?
A. More experienced employees from less experienced employees
B. Changes to program code and the ability to deploy to production
C. Upper level management users from standard development employees
D. The network access layer from the application access layer
Definition
B. Changes to program code and the ability to deploy to production
Term
A security administrator needs to update the OS on all the switches in the company. Which of the
following MUST be done before any actual switch configuration is performed?
A. The request needs to be sent to the incident management team.
B. The request needs to be approved through the incident management process.
C. The request needs to be approved through the change management process.
D. The request needs to be sent to the change management team.
Definition
C. The request needs to be approved through the change management process.
Term
ane, an individual, has recently been calling various financial offices pretending to be another person to gain financial information. Which of the following attacks is being described?
A. Phishing B. Tailgating C. Pharming D. Vishing
Definition
D. Vishing
Term
A user in the company is in charge of various financial roles but needs to prepare for an upcoming audit. They use the same account to access each financial system. Which of the following security controls will MOST likely be implemented within the company?
A. Account lockout policy
B. Account password enforcement C. Password complexity enabled D. Separation of duties
Definition
D. Separation of duties
Term
A CRL is comprised oF.
A. Malicious IP addresses. B. Trusted CA’s.
C. Untrusted private keys. D. Public keys.
Definition
D. Public keys.
Term
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST describes this type of malware?
A. Logic bomb B. Worm
C. Trojan
D. Adware
Definition
C. Trojan
Term
Which of the following may significantly reduce data loss if multiple drives fail at the same time?
A. Virtualization
B. RAID
C. Load balancing D. Server clustering
Definition
B. RAID
Term
Which of the following should be considered to mitigate data theft when using CAT5 wiring?
A. CCTV
B. Environmental monitoring C. Multimode fiber
D. EMI shielding
Definition
D. EMI shielding
Term
To help prevent unauthorized access to PCs, a security administrator implements screen savers that lock the PC after five minutes of inactivity. Which of the following controls is being described in this situation?
A. Management B. Administrative C. Technical
D. Operational
Definition
C. Technical
Term
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols. Which of the following should he do to segment that traffic from the other traffic?
A. Connect the WAP to a different switch. B. Create a voice VLAN.
C. Create a DMZ.
D. Set the switch ports to 802.1q mode.
Definition
B. Create a voice VLAN.
Term
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Select TWO).
A. 10.4.4.125 B. 10.4.4.158 C. 10.4.4.165 D. 10.4.4.189 E. 10.4.4.199
Definition
C. 10.4.4.165
D. 10.4.4.189
Term
Which of the following algorithms has well documented collisions? (Select TWO).
A. AES
B. MD5
C. SHA
D. SHA-256 E. RSA
Definition
B. MD5
C. SHA
Supporting users have an ad free experience!