Security+ DCOM 258

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following ranges comprise the well-known ports category?

0-1023

Your network uses the following subnet mask: 255.255.255.224. Which of the following IPv4 addresses are able to communicate with each other?

10.36.36.184 10.36.36.166

Which port does Remote Desktop Services use?

3389

To use the Lightweight Directory Access Protocol (LDAP) in a secure fashion, what port should be used?

636

What is the most common port used when connecting an Internet Explorer browser to a proxy server for use with HTTP connections?

80

Which standard is a software extension of Switch Port Security?

802.1X

What port does Kerberos use by default?

88

This type of attack attempts to spoof a MAC address thereby allowing a Man in the Middle or DoS attack.

ARP Poisoning

Which of the following is described as "when a person's identity is confirmed or verified through the use of a specific system"?

Authentication

Which of the following does the "A" in "CIA" stand for when relating to IT security?

Availability

Which of the following is placed in an application by programmers either knowingly or inadvertently to bypass normal authentication?

Backdoor

Which of the following methods of malware delivery is used in computer programs to bypass normal authentication?

Backdoor

Which of the following is an example of whole disk encryption?

Bitlocker

An attacker takes advantage of a vulnerability in programming that allows the attacker to copy more than 16 bytes to a standard 16 byte variable. What attack is being initiated?

Buffer Overflow

James doesn't want people to see where he browsed to on the Internet. What is a good way to clear his Internet browsing history?

Check mark the Empty Temporary Internet Files Folder When the Browser Is Closed check box.

All are types of physical security except:

Concrete Barriers

Which of the following is the greatest risk for removable storage?

Confidentiality of Data

Which of the following is used to house FTP servers, mail servers, and web servers so that people on the Internet can access them but cannot access any other of the organization's servers?

DMZ

You are the security administrator for your organization. You want to ensure the confidentiality of data on mobile devices. What the best solution?

Device Encryption

A MAC flood is when a person accesses a single port of a switch that was not physically secured.

False

A NIDS can inspect traffic and possibly remove, detain, or redirect malicious traffic.

False

A honeypot is a device that caches information for hackers.

False

A smart card is an example of something a user knows.

False

Active interception is the act of exploiting a bug or design flaw in software.

False

ActiveX controls can run on any browser platform.

False

Attenuation typically occurs with copper connections, but rarely occurs with fiber connections.

False

Fiber-optic cable is susceptible to data emanations.

False

Least privilege is a concept that denies all traffic to a resource unless the user is specifically granted access to that resource.

False

NAT filtering accepts or rejects packets based on rules.

False

One example of PaaS is a Gmail email account.

False

One way to protect a WAN is to place all the computers behind a router.

False

Opening mail relays can decrease the amount of spam that an organization receives on its e-mail server.

False

Port 53 is used for DHCP

False

Social engineering includes viruses, worms, and Trojan horses.

False

The love bug is an example of a rootkit.

False

The net stop commands disable services in Windows.

False

The network 10.0.0.0 is a Class B private IP network.

False

To accept fewer cookies, you would add them to the Restricted Sites zone.

False

To open the Local Group Policy Editor console window, a user should type MMC in the Run prompt.

False

Viruses self-replicate whereas worms do not.

False

WPA2 has a typical key size of 128 bits.

False

When a network security device experiences a system failure, it is best for it to default to a "Fail / Open" state.

False

Which of the following occurs when an IDS identifies legitimate activity as something malicious?

False-Positive

Which of the following should be your primary line of defense?

Firewall

Alice has detected an intrusion into her company network. What should she check first?

Firewall Logs

Which type of hacker has no affiliation with an organization yet will hack systems without malicious intent, but yet may be doing something illegal?

Gray Hat

By an overwhelming percentage, most security / data breaches are caused by:

Human Error/Negligence

Which of the following devices should you use to keep machines behind it anonymous?

IP Proxy

Of the following, which can be a security benefit when using virtualization?

If a virtual machine is compromised, the adverse effects can be compartmentalized.

Which of the following is likely to be the last rule contained with the ACLs of a firewall?

Implicit Deny

Which of the following would protect against an attacker entering malicious code into a web form?

Input Validation

For information security, what is the I in CIA?

Integrity

Which of the following can run on any platform?

Java Applets

Which of the following uses a two-way authentication system known as mutual authentication?

Kerberos

Which of the following are commonly used in VPN tunneling protocols?

L2TP PPTP

What is a malicious attack that executes at the same time every week?

Logic Bomb

Which of the following are virtualization software types?

Microsoft Virtual PC Microsoft Virtual Server VMware

Which of the following is the best file system to use in Windows?

NTFS

Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

Nonrepudiation

Which of the following is not a good strategy for securing a WAP?

Place it in a Faraday cage

Which of the following is the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would be protected from an application or user?

Privilege Escalation

Which of the following is not a denial-of-service attack?

Replay Attack

An example of authorization with "something you are" would be?

Retina Pattern

What does isolation mode on an AP provide?

Segments each wireless user from every other wireless user

Which of the following can best be described as the exploitation of a computer session in an attempt to gain unauthorized access to data?

Session Hijacking

Which attack type uses ICMP messages to create a DoS attack?

Smurf

This is a group of standards that investigates and recommends security and technical policies regarding the electrical and magnetic emissions from electronic and mechancial devices.

TEMPEST

Which of the following is the phase of the SDLC where a system is checked thoroughly for bugs?

Testing

What is baselining?

The process of measuring changes in networking devices, hardware, and software.

One of the biggest problems with BYOD is

There is virtually no security control over the sofware / hardware.

Which is not a type of Social Engineering?

Trojan

A DMZ is a special area of the network accessed by clients on the Internet.

True

A RAT is an example of a Trojan horse.

True

A false positive is when a system authenticates a user who should not be allowed to access that system.

True

A master computer controls a botnet.

True

A proxy server acts as a go-between of a client computer's web browser and the web server.

True

A service pack is a group of updates, bug fixes, updated drivers, and security fixes.

True

By checking CVEs you can keep informed of the latest attacks to web servers.

True

Crosstalk is when a signal transmitted on one copper wire creates an unwanted effect on another wire; the signal "bleeds" over, so to speak.

True

DAC is an access control policy generally determined by the owner.

True

Default accounts often have weak passwords.

True

EMI is a disturbance that can affect electrical circuits, devices, and cables due to electromagnetic conduction or radiation.

True

Encryption, authentication, and anti-malware are all ways to protect against malicious threats.

True

FTP uses ports 20 and 21

True

HTTPS uses port 443

True

In information security the three main goals are known as Confidentiality, Integrity, and Availability.

True

Malware is software designed to infiltrate a computer system without the users consent.

True

Most antimalware / virus software is signature based.

True

Separation of duties is when more than one person is required to complete a task.

True

The second step in a patch management strategy is testing.

True

The systeminfo commands show a list of hot fixes that have been installed to the operating system.

True

To change permissions on a file in Linux, you would use the chmod commands.

True

UAC keeps every user in standard mode instead of in administrator mode by default.

True

Which of the following should you implement to keep a well-maintained computer?

Update the firewall. Update the BIOS. Use a surge protector.

Which of the following is not an example of good FTP server security?

Use port 21

You have been tasked with segmenting internal traffic between layer 2 devices on the LAN. Which of the following network design elements would most likely be used?

VLAN

The act of splitting the wires of a twisted-pair cable connection would be an example of which of the following?

Wiretapping

Which of the following is an example of a personal software firewall?

ZoneAlarm

Which commands disable a service in the command line?

sc config

Which command lists the hotfixes installed to Windows?

systeminfo


संबंधित स्टडी सेट्स

Unit V Homework Assignment-chapter 5

View Set

3.1- US Economic History/3.2- The Business Cycle

View Set

Chapter 1 Notes AP Environmental Science

View Set

physics electricity questions part 2

View Set

Forensics Crime Scene Evaluation

View Set

Secondary Education: Gallaudet University

View Set

Intro to Sociology Chapters 10-12

View Set

NUR208 EAQ 1: Health and Maintenance

View Set