220-1102 Security Flashcards

1
Q

What is a small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. Also known as a mantrap.

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are devices that store some unique information that a user carries on their person?

A

Security tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device provides a one-time use code that is used to authenticate a user in addition to a username and password?

A

RSA Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common RSA Token in hard token form?

A

Key Fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a fancy term for a metal detector?

A

Magnetometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kinds of drives can support access control lists (ACLs)

A

Drives with modern file systems such as NTFS, APFS, HFS+, and ext3/4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a soft token?

A

Authenticator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a Windows domain, a computer running Windows Server is configured as a what?

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a domain controller store?

A

domain accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can a login script do for a domain account?

A

Map network drives, place an information box on the screen, run applications and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In active directory, what enables you to organize users and computers by function, location, permission and more?

A

Organizational units (OUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do roaming profiles in active directory provide the user?

A

Each time the user logs into a new machine, their home folder data can move with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between active directory groups, security groups, and user groups?

A

Active directory groups and security groups are the same term. They are more powerful and more centrally managed than user groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an interlinked area of physical and logical security that includes: physical security, authentication, users, groups, and security policies?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption standard does WPA2 use?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which wifi security addresses usability and security issues that affected its predecessor by including encryption to protect data of users on open (public) networks?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which encryption method was introduced in WPA and is supported by WPA2, but lessens security?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which authentication protocol enables a central authorization server to pass out keys that individual clients can present to access resources as needed?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is malware that replicates and activates by attaching to executable programs or the drives boot sector?

A

Virus

20
Q

What kind of virus live inside the system’s boot partition and activate their malicious code before the security software can start?

A

Boot sector virus

21
Q

What is it called when a virus does something like corrupting data or stealing private information?

A

Activation

22
Q

What kind of malware does not need to attach itself to other programs to replicate?

A

Worm

23
Q

What is a piece of malware that appears or pretends to do one thing while, at the same time, doing something evil?

A

Trojan

24
Q

What malware logs the user’s keystrokes and makes that information available to the attacker?

A

Keylogger

25
Q

Which malware takes advantage of very low-level operating system functions to hide itself?

A

Rootkit

26
Q

What are the 7 steps for malware removal

A
  1. Investigate and verify malware symptoms
  2. Quarantine infected systems
  3. Disable System Restore in Windows
  4. Remediate infected systems
    A. Update anti-malware software
    B. Scanning and removal techniques
  5. Schedule scans and run updates
  6. Enable System Restore and create a restore point in Windows
  7. Educate the end user
27
Q

When attempting to remediate an infected system, what do you do if you restore from a backup and the system is still infected?

A

Perform a clean install

28
Q

CompTIA considers removing a virus as part of what step?

A

Remediation

29
Q

What is a fake wireless access point configured to mimic the traits of a legitimate device and network?

A

Evil Twin

30
Q

What attack is when the attacker injects malicious code into the Web app in order to trick it into sending things it shouldn’t to other users of the Web site?

A

Cross-site scripting (XSS)

31
Q

Which Windows account has almost as much power as an Administrator?

A

Power User

32
Q

Which NTFS setting controls which NTFS permissions apply to newly created files or subfolders?

A

Inheritance

33
Q

Which variation of Bitlocker can encrypt removable drives?

A

Bitlocker to go

34
Q

Which Windows feature opens a dialogue box when removable media is inserted into the computer, providing options based on what Windows finds on the drive, including starting the autorun application.

A

AutoPlay

35
Q

Which Windows feature enables Windows to look for and read a file called autorun.inf immediately after a removable media device (optical disk or thumb drive) is inserted and automatically run whatever program that file lists?

A

Autorun

36
Q

How do third party drive disposal services guarantee they have destroyed drives?

A

By issuing a certificate of destruction/recycling

37
Q

What are phyiscal destruction techniques?

A

drilling, shredding, degaussing and incineration.

38
Q

What security setting enables an administrator to set rules about whether packets should be sent or received based on the source or destination IP address?

A

IP filtering

39
Q

Which security setting enables you to open an incoming connection to one computer automatically based on a specific outgoing connection?

A

Port triggering

40
Q

Which security setting puts any system within the specified IP addresses outside the protection of the firewall, opening all ports and enabling all incoming traffic?

A

Screened subnet

41
Q

Why should you change the SSID of a WAP?

A

The default SSID gives away important clues about the manufacturer and model of an access point

42
Q

which shutdown option has the system restart instead of shutting down?

A

/r

43
Q

In the command prompt, what does the F1 key do?

A

rebuilds the last command one letter at a time

44
Q

In the command prompt, what does the F3 do?

A

rebuilds the entire command at once

45
Q

How do you cycle through the history of your previous commands in command prompt?

A

Press the up arrow to see your previous commands. Press the right arrow to add the options

46
Q

What are signs and symptoms of a malware infection?

A
  • slowdowns
  • random crashes
  • automated replies from unknown sent email
  • increase in desktop alerts
  • unwanted notifications within the OS
  • false alerts regarding your computer’s antivirus
  • OS update failures
  • unable to access the network
  • browser redirection
  • browser random/frequent pop-ups
47
Q

What are 12 risks, symptoms and clues of a malware infection specifically for mobile devices?

A
  • Unexpected Resource Use
  • Sluggish Response Time
  • High Network Traffic
  • Data-Usage Limit Notification
  • Unexpected Behaviors
  • Unintended Connections
  • Connectivity Issues
  • Unauthorized Data Access
  • Unauthorized Account Access
  • Unauthorized Root Access, Developer Mode, and Sideloading
  • Unauthorized Location Tracking
  • Unauthorized Camera and Microphone Activation