220-1102 Security Flashcards

(68 cards)

1
Q

What is a small room with a set of two doors, one to the outside, unsecured area and one to the inner, secure area. Also known as a mantrap.

A

Access Control Vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are devices that store some unique information that a user carries on their person?

A

Security tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device provides a one-time use code that is used to authenticate a user in addition to a username and password?

A

RSA Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common RSA Token in hard token form?

A

Key Fob

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a fancy term for a metal detector?

A

Magnetometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What kinds of drives can support access control lists (ACLs)

A

Drives with modern file systems such as NTFS, APFS, HFS+, and ext3/4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a soft token?

A

Authenticator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a Windows domain, a computer running Windows Server is configured as a what?

A

domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a domain controller store?

A

domain accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can a login script do for a domain account?

A

Map network drives, place an information box on the screen, run applications and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In active directory, what enables you to organize users and computers by function, location, permission and more?

A

Organizational units (OUs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do roaming profiles in active directory provide the user?

A

Each time the user logs into a new machine, their home folder data can move with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between active directory groups, security groups, and user groups?

A

Active directory groups and security groups are the same term. They are more powerful and more centrally managed than user groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an interlinked area of physical and logical security that includes: physical security, authentication, users, groups, and security policies?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encryption standard does WPA2 use?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which wifi security addresses usability and security issues that affected its predecessor by including encryption to protect data of users on open (public) networks?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which encryption method was introduced in WPA and is supported by WPA2, but lessens security?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which authentication protocol enables a central authorization server to pass out keys that individual clients can present to access resources as needed?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is malware that replicates and activates by attaching to executable programs or the drives boot sector?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What kind of virus live inside the system’s boot partition and activate their malicious code before the security software can start?

A

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is it called when a virus does something like corrupting data or stealing private information?

A

Activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What kind of malware does not need to attach itself to other programs to replicate?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a piece of malware that appears or pretends to do one thing while, at the same time, doing something evil?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What malware logs the user’s keystrokes and makes that information available to the attacker?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which malware takes advantage of very low-level operating system functions to hide itself?
Rootkit
26
What are the 7 steps for malware removal
1. Investigate and verify malware symptoms 2. Quarantine infected systems 3. Disable System Restore in Windows 4. Remediate infected systems A. Update anti-malware software B. Scanning and removal techniques 5. Schedule scans and run updates 6. Enable System Restore and create a restore point in Windows 7. Educate the end user
27
When attempting to remediate an infected system, what do you do if you restore from a backup and the system is still infected?
Perform a clean install
28
CompTIA considers removing a virus as part of what step?
Remediation
29
What is a fake wireless access point configured to mimic the traits of a legitimate device and network?
Evil Twin
30
What attack is when the attacker injects malicious code into the Web app in order to trick it into sending things it shouldn't to other users of the Web site?
Cross-site scripting (XSS)
31
Which Windows account has almost as much power as an Administrator?
Power User
32
Which NTFS setting controls which NTFS permissions apply to newly created files or subfolders?
Inheritance
33
Which variation of Bitlocker can encrypt removable drives?
Bitlocker to go
34
Which Windows feature opens a dialogue box when removable media is inserted into the computer, providing options based on what Windows finds on the drive, including starting the autorun application.
AutoPlay
35
Which Windows feature enables Windows to look for and read a file called autorun.inf immediately after a removable media device (optical disk or thumb drive) is inserted and automatically run whatever program that file lists?
Autorun
36
How do third party drive disposal services guarantee they have destroyed drives?
By issuing a certificate of destruction/recycling
37
What are phyiscal destruction techniques?
drilling, shredding, degaussing and incineration.
38
What security setting enables an administrator to set rules about whether packets should be sent or received based on the source or destination IP address?
IP filtering
39
Which security setting enables you to open an incoming connection to one computer automatically based on a specific outgoing connection?
Port triggering
40
Which security setting puts any system within the specified IP addresses outside the protection of the firewall, opening all ports and enabling all incoming traffic?
Screened subnet
41
Why should you change the SSID of a WAP?
The default SSID gives away important clues about the manufacturer and model of an access point
42
which shutdown option has the system restart instead of shutting down?
/r
43
In the command prompt, what does the F1 key do?
rebuilds the last command one letter at a time
44
In the command prompt, what does the F3 do?
rebuilds the entire command at once
45
How do you cycle through the history of your previous commands in command prompt?
Press the up arrow to see your previous commands. Press the right arrow to add the options
46
What is a deviation from established standards, specifications or requirements?
Non-compliance
47
Which AAA technology - Encrypts the entire payload of the access-request packet - is Primarily used for device administration - Separates authentication and Authorization?
TACACS+
48
Which AAA technology - is Primarily used for network access - Combines authentication and authorization - Encrypts only the password in the access-request packet
RADIUS
49
Which AAA technology is a completely open standard developed by the IETF? It is partially encrypted and uses UDP ports 1812 and 1813.
RADIUS
50
What was developed as a proprietary protocol by Cisco but has been released as an "open" description so other companies can implement it? It is fully encrypted and runs on TCP port 49
TACACS+
51
Which Wifi security standard utilizes AES-GCMP?
WPA3
52
What malware makes copies of itself by injecting itself as extra code added to the end of executable programs?
Virus
53
What kind of attack: - Exploits the trust a user's web browser has in a website - A malicious script is injected into a trusted website - The users browser executes attacker's script
XSS
54
What kind of attack is when an attacker injects malicious code into a web app in order to trick it into sending things it should't to other users of the Web Site.
Cross-Site Scripting (XSS)
55
What are the three different ways you can run an application as a administrator in windows?
- right click on an application icon and select run as administrator - In the Windows start menu, press and hold control + shift keys and left-click on an application icon - Launch windows run dialog box (windows logo key + R) type in the applications name and press control + shift + enter
56
in NTFS, does a folder copied from one location to another retain its original permissions or inherets permissions of its new parent folder?
parent folder
57
What is the correct syntax for applying read-only attributes to a file?
attrib +R [drive:] [path] [filename]
58
Which user group in Windows (Win 7 and before) had rights and permission that allowed its members to perform specific administrator-level tasks?
Power Users
59
In Windows, does a file moved on the same volume keep original permissions or inherits new permissions?
keeps original
60
In Windows, does a file moved to a different volume keep original permissions or inherits new permissions?
Inherits new permissions
61
What allows Windows to automatically execute code contained on a newly mounted storage media?
AutoRun
62
What is a system component that displays a dialog box containing applicable options for newly mounted storage media?
AutoPlay
63
What is quick format often referred to as?
High-level format
64
What simplifies networking by allowing devices to dynamically join a network, autoconfigure and learn about the presence and capabilities of other devices?
UPnP
65
What is referred to as zero-configuration networking?
UPnP
66
What is application software the selectively blocks access to websites?
Content Filter
67
What two types of VPNs allows a device to connect to the company network over an untrusted network?
Remote Access and Client-to-site
68
What software - Gives permanent remote access - Access is based on a local password - A Windows tool used for connecting remotely to the user's own computer
RDP