Security+ - Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which security standard is used to encrypt e-mails?

S/MIME

Which hashing algorithm uses a 160-bit hash value?

SHA

___________________ is a slang term for unwanted commercial e-mail.

SPAM

Which method of code breaking ties every possible combination of characters in an attempt to "guess" the password or key?

Brute Force

The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly?

GFS

Which "X" standard defines certificate formats and fields for public keys?

X.509

The process of making a computing environment more secure from attacks and intruders is known as ___________________________.

Hardening

PEAP was developed by a consortium including:

Cisco, Microsoft, and RSA Security

Which encryption algorithm is based on Rijndael?

AES

How many channels does the 802.11 standard define?

14

Which of the following is not an asymmetric encryption algorithm?

3DES

Computer room humidity should ideally be kept above ___________________ percent.

50

Which encryption/security measure, originally developed by Netscape, is used to establish a secure, lower-layer communication connection between two TCP/IP-based machines?

Secure Sockets Layer (SSL)

A ___________________is the term for an area in a building where access is individually monitored and controlled.

Security Zone

Which of the following is a type of attack that occurs when an attacker pretends to be a legitimate client, using information it has gained from a legitimate client (like its IP address)?

Spoofing

Which of the following is a method used with OCSP, which allows a web server to provide information on the validity of its own certificate rather than needing to go to the certificate vendor?

Stapling

What kind of cryptographic method replaces one character with another from a "match-up list" to produce the ciphertext? The decoder wheels kids get in cereal boxes often make this kind of cryptography.

Substitution Cipher

Which of the following is an internal threat?

System Failure

A simulation of a disaster is known as __________________.

Table-top exercise

Which fire extinguisher type is the best to be used on computer equipment in the case of a computer fire?

Type C

Your company has given you a laptop to use as you travel. What category does this laptop fall under?

UMTS

Which encryption algorithm uses a 40- to 128-bit key and is used on many products from Microsoft and IBM?

CAST

Which of the following uses multiple transparent or opaque layers to trick a user into clicking a button or link on another page when they had intended to click on the top page?

Clickjacking

Individuals who specialize in the breaking of codes are known as ___________________.

Cryptanalysts

Which of the following is a hole created when code is executed with higher privileges than those of the user running it?

Escalation of Privilege

Which of the following is recommended for incident response teams?

Exercise responses to emergencies before they happen

A __________________ is a repair made while the system is being repaired remains in operation.

Hotfix

Which U.S. government agency publishes lists of known vulnerabilities in operating systems?

NIST

Which U.S. government agency is responsible for creating and breaking codes?

NSA

___________________ provide rules for expected behaviors to people in an organization.

Policies

In which of the following does the tester have significant knowledge of the system and simulates an attack from an insider?

White Box

Which of the following is not a component of Public Key Infrastructure (PKI)?

XA

Your company has given you a laptop to use as you travel. What category does this laptop fall under?

COPE

Which of the following is an attack where a program or service is placed on a server to bypass normal security procedures?

Back door

Which of the following will NOT contribute to network hardening?

Installing New Anti-Virus software on workstation

A ___________________ security device uses some biological characteristic of human beings to uniquely identify a person for authentication.

Biometric

Which of the following is used to refer to any sophisticated series of related attacks taking place over an extended period of time?

APT

The area of an application that is available to users (those who are authenticated as well as those who are not) is known as its:

Attack surface

Which document is used to propose a new standard?

RFC

Individuals who specialize in the making of codes are known as ___________________.

Cryptographers

Which of the following provides continuous online backup by using optical or tape jukeboxes?

HSM

A major organization in the tracking and reporting of common computer and network security problems is ___________________.

CERT

A ___________________ is used to provide EMI and RFI shielding for an entire room of computer or electronic equipment (also used to prevent eavesdropping).

Faraday cage

With which type of technology will allow a device to function only if it is within certain geographical locations?

Geofencing

You are the administrator of the xyz.com website. You are working when suddenly web server and network utilization spikes to 100% and stays there for several minutes and users start reporting "Server not available" errors. You may have been the victim of what kind of attack?

DoS

Which organization is tasked with developing standards for, and tries to improve, the Internet?

IEFT

___________________ is the first step in the incident response cycle.

Incident identification

How does a user obtain a message authentication code (MAC)?

It is derived from the message itself using an algorithm.

On the outer edge of physical security is the first barrier to entry. This barrier is known as a(n) ___________________.

Perimeter

Which method of cyrptography uses a sequence of photons to represent the encrypted data?

Quantum Cryptography


Ensembles d'études connexes

Ch 13 - Spinal Cord & Spinal Nerves (ultimate study)

View Set

Theories of Counseling - Gestalt

View Set

Primary and Secondary sex characteristics, Psychology Chapter 10

View Set

Management of Patients with Immune Deficiency Disorders

View Set