Missed Test Qs Flashcards

1
Q

3.) Which of the following types of physical security is most likely to detect an insider threat?

Smartcards
Motion detection
Video surveillance
Biometrics

A

Video surveillance

An insider threat by definition originates with an authorized user. Smartcards, motion detection, and biometrics will only detect the presence of someone who is authorized to enter sensitive areas.

Video surveillance, however, can track the activities of anyone, authorized or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5.) Which of the following are common types of cameras used for video surveillance of secured network installations? (Choose all correct answers.)

IP
LDAP
CCTV
NAC

A

A and C.

Closed circuit television cameras are part of a self-contained system in which the cameras feed their signals to dedicated monitors, usually located in a security center. IP cameras are standalone devices that transmit signals to a wireless access point. While CCTV cameras can only be monitored by users in the security center, or another designated location, IP cameras can be monitored by any authorized user with a web browser. LDAP is a directory services protocol and Network Access Control is a service; neither one is a type of video surveillance device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

10.) Which of the following physical security devices can use passive RFIDs to enable an authorized user to enter a secured area? (Choose all correct answers.)

a Key fob
b Keycard lock
c Prox card
d Cypher lock

A

A and C.

A radio frequency identification (RFID) device is a small chip that can be electronically detected by a nearby reader. The chip can contain small amounts of data, such as the authentication credentials needed to grant an individual access to a secured area. Key fobs and proximity cards (prox cards) often use RFIDs to enable users to unlock a door by waving the device near a reader. Keycard locks typically require the card to be inserted into a reader and typically use magnetic strips to store data.Cypher locks rely on data supplied by the user—that is, the combination numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

12.) Which of the following physical security devices can enable an authorized user to enter a secured area without any physical contact with the device? (Choose all correct answers.)

aKey fob
b Keycard lock
c Prox card
d Cypher lock

A

A and C. Key fobs and proximity cards (prox cards) often use RFIDs to enable users to unlock a door by waving the device near a reader. Keycard locks typically use magnetic strips to store data and require the card to be physically inserted into a reader. Cypher locks rely on data manually supplied by the user—that is, the combination numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

13.) Video surveillance of sensitive areas, such as datacenters, can prevent which of the following types of attacks? (Choose all correct answers.)

a Social engineering
b Evil twin
c Brute force
d Insider threats

A

B and D. Video surveillance can conceivably prevent evil twin attacks because these take the form of a rogue access point deliberately connected to the network for malicious purposes. Video surveillance can also help to prevent insider threats by monitoring the activities of authorized users. Video surveillance cannot prevent social engineering, which involves nothing more than communicating with people, or brute-force attacks, which are usually performed remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

11.) Some key fobs used for authenticated entrance to a secured area have a keypad that requires the user to enter a PIN before the device is activated. Which of the following authentication factors is this device using? (Choose all correct answers.)

a Something you do
b Something you have
c something you are
d something you know

A

B and D. Possession of the key fob is something you have, but the key fob could be lost or stolen, so its security is confirmed by the entrance of a PIN, something you know. Unless the user both lost the key fob and shared the PIN, the device remains secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

23.) Which of the following statements about a public key infrastructure (PKI) are true? (Choose all correct answers.)

a Data encrypted with the public key can only be decrypted using that public key.

b Data encrypted with the private key can only be decrypted using that private key.

c Data encrypted with the public key can only be decrypted using the private key.

d Data encrypted with the private key can only be decrypted using the public key.

A

C and D.

In a PKI, data encrypted with the private key can only be decrypted using the public key.

Therefore, anyone receiving data encrypted with the private key can obtain the public key and decrypt it, confirming that the data originated with the private key holder.

Because the public key is freely available, anyone can encrypt data using the public key and be sure that only the private key holder can decrypt it.

Zacker, Craig. CompTIA Network+ Practice Tests (p. ix). Wiley. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

24.) Which of the following authentication protocols do Windows networks use for Active Directory Domain Services authentication of internal clients?

a RADIUS
b WPA2
c Kerberos
d EAP-TLS

A

C. Windows networks that use AD DS authenticate clients using the Kerberos protocol, in part because it never transmits passwords over the network, even in encrypted form. RADIUS is an authentication, authorization, and accounting service for remote users connecting to a network. Windows does not use it for internal clients. WPA2 is a security protocol used by wireless LAN networks. It is not used for AD DS authentication. EAP-TLS is a remote authentication protocol that AD DS networks do not use for internal clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

26) Which of the following statements best describes asymmetric key encryption?

a A cryptographic security mechanism that uses the same key for both encryption and decryption

b A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data

c A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data

d A cryptographic security mechanism that uses separate private keys to encrypt and decrypt data

A

B. Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. The reverse is also true. Symmetric key encryption uses only one key both to encrypt and decrypt data. Security mechanisms that use multiple key sets are not defined as symmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. How many keys does a system that employs asymmetric encryption use?

a None. Asymmetric encryption doesn’t require keys.

b One. Asymmetric encryption uses one key for both encryption and decryption.

c Two. Asymmetric encryption uses one key for encryption and another key for decryption.

d Three. Asymmetric encryption requires a separate authentication server, and each system has its own key.

A

C. Asymmetric encryption uses two separate keys, one for encryption and one for decryption. In a public key infrastructure (PKI), each user, computer, or service has both a public key and a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

30.) How many keys does a system that employs symmetric encryption use?
a None. Symmetric encryption doesn’t require keys.
b One. Symmetric encryption uses one key for both encryption and decryption.
c Two. Symmetric encryption uses one key for encryption and another key for decryption.
d Three. Symmetric encryption requires a separate authentication server, and each system has its own key.

A

B. Symmetric encryption uses one key, which the systems use for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
31.) Which of the following services are methods of tracking a user’s activities on a network? (Choose all correct answers.)  
a Authentication 
b Authorization 
c Accounting 
d Auditing

Zacker, Craig. CompTIA Network+ Practice Tests (p. 144). Wiley. Kindle Edition.

A

C and D. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected. Authentication is the confirmation of a user’s identity, and authorization defines the type of access granted to authenticated users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

32.) When a user supplies a password to log on to a server, which of the following actions is the user performing?

a Authentication
b Authorization
c Accounting
d Auditing

A

A. Authentication is the process of confirming a user’s identity. Passwords are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

37.) Which of the following statements about authentication auditing are not true?

A. Auditing can disclose attempts to compromise passwords.
B Auditing can detect authentications that occur after hours.
C Auditing can identify the guess patterns used by password cracking software.
D Auditing can record unsuccessful as well as successful authentications.

A

C. Auditing of authentication activities can record both successful and unsuccessful logon attempts. Large numbers of logon failures can indicate attempts to crack passwords. Auditing tracks the time of authentication attempts, sometimes enabling you to detect off-hours logons that indicate an intrusion. Auditing does not record the passwords specified during authentications, so it cannot identify patterns of unsuccessful guesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

38.) Which of the following types of key is included in a digital certificate?

a Public
b Private
c Preshared
d Privileged

A

A. As part of a public key infrastructure (PKI), digital certificates are associated with a key pair, consisting of a public key and a private key. The public key is supplied with the certificate to any party authenticating the entity to which the certificate was issued. The private key is supplied to the entity with the certificate, but it is not distributed as part of the certificate. Preshared keys are not associated with certificates, and privileged keys do not exist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly