CompTIA Security (Plus) Flashcards
90
The first and most critical step of auditing is:
A. to audit all user activity
B. to ensure the correct things are being audited
C. to review audit data on a periodic basis
D. to back up audit logs to remote systems in case of system compromise
B.
the first and most critical step of auditing is to ensure the correct things are being audited.
47 The term "Open Relay" refers to what? A. HTTP Servers B. FTP Servers C. Email Servers D. Application Servers
C: Open Relay, also known as Open Mail Relay, refers to allowing to send mail through a mail server. This is the source of much of the spam people receive.
HTTP, is incorrect HTTP servers simply process requests.
20 Twofish was designed to replace what algorithm? A. Blowfish B. DES C. MD5 D. AES
B. Twofish was a candidate to replace DES as part of the AES competition.
79 Which port should be opened on a firewall to permit e-mail traffic to pass? A. TCP 21 B. UDP 88 C. TCP 25 D. TCP 139
C. is correct; TCP Port 25 is used by SMTP (Simple Mail Transport Protocal)
TCP 21 is used for what?
FTP
Define (SMTP)
Simple Mail Transport Protocal
UDP 88 is used with what?
Kerberos
What is TCP 139 used for?
NetBIOS
86
Privilege auditing is not useful for what?
A. following the “trust but verify” philosophy.
B. help[ing to ensure that users have been granted the correct privileges and rights required to perform their assigned duties.
C. Large corporations or positions with a high rate of turnover or employee movement.
D. identifying users with evil intentions
D. audits cannot determine users intentions, only what permissions the user should have based on logical factors.
A,B,C, are incorrect; these are all advantages of privilege auditing.
48 An Accounting Lockout Policy is an excellent countermeasure against which type of attack? A. Virus B. DoS C. Smurf Attack D. Brute-Force Attack
D. an account lockout policy will typically require an account be disabled for a period of time before the user can try their password again, making a brute force attack time-consuming and more easily detectable.
64 A web application firewall is designed to detect and stop which of the following? A. SQL injection attacks B. Port Scan C. Infected email traffic D. Worms
A. web security gateways are intended to address the security threats and pitfalls unique to web-based traffic such as SQL injection attacks.
B,C,D, are incorrect; although these are potential attacks, they are not against web applications.
78
When a certificate authority signs a certificate, it uses what to do so?
A. nothing, CAs do not sign certificates
B. the CA’s public key
C. the CA’s private key
D. the requestor’s public key
C. the CA uses its private key, allowing users to use the public key to authenticate the origin of the signature.
A. is incorrect, CA’s “do” download certificates
97 Which of the following documents is used to determine your most critical business functions and is used to help build your DRP? A. Business Continuity Plan B. Backup Recovery Plan C. Business Function Assessment D. Business Impact Analysis
D. the BIA outlines what the loss of any of your critical functions will mean to the organization and is used in the development of the Disaster Recovery plan (DRP) .
94
Which of the following models of computer security implements the principle,
Protection = Prevention + (Detection + Response) ?
A. Bell-LaPadula
B. Operational Security
C. Biba
D. Chinese Wall
B. the Operational Security model is defined as:
Protection = Prevention + (Detection + Response)
A,C,D, are incorrect, they are “access” control models of differing types.
55
An Access Control List (ACL) is?
A. the list of authorized users on the system or network
B. the list of all authorized users that are currently on the system or network
C. a list that contains the subjects that have accfess rights to a particular object
D. A list of subjects not allowed access to a particular object
C. an “Access Control List” (ACL) is used to define which subjects have which access rights to a particular object. The list identifies not only the subject but the specific access granted to the subject for the object.
99 Which of the following is an example of a MAC address? A. 127.0.0.1 B. 255.255.255.0 C. 2001:db8:85a3::8a2e:370:733 D. 00:07:e9:7c:c8:aa
D is correct, it is a MAC address and is a hexadecimal representation of 48 bitsw
A. is an IP address
B. is a common subnet mask for IPv4
C. is an IPv6 address
33 Which device does not segregate data-link traffic? A. Switch B. Hub C. Bridatege D. VLAN
B. is correct as hubs do not segregate ant type of network traffice.
A. switches seperate traffic based on layer 2 addresses.
C. bridges split traffic based on layer 2 adddresses
D. is incorrect, VLANs are implemented using switches and layer 2 addresses.
31 Which of the following is not a method to implement 802.1X? A. EAP-RC2 B. EAP-MD5 C. EAP-TTLS D. EAP-TLS
A. is correct, RC2 is not a valid crypto scheme for 802.1X B,C, and D, are incorrect. B uses MD5 for encryption C. is tunneling TLS D. is TLS
98
Which of hte following measrues will NOT improve the pgysical security of a computer?
A. Insuring the server
B. Restricting physical access to the server
C. Use of locking rack mounts
D. High-Security locks
A. is the correct answer, insuring the server only provides a financial method of recovering from some aspect of lkoss; it does not improve the level of physical security.
41 Which widely used protocol is available to vendors to establish their own customized authentication system? A. ICMP B. EAP C. PPP D. PPTP
B is correct, Extensible Authentication Protocal (EAP) allows vendors to cusomize their own authentication system.
ICMP is not used in authentication
17 What kind of algorithim uses the same key to encrypt and decrypt a message? A. Alphanumeric Algorithm B. Asymmetric Algorithm C. Symmetric Algorithm D. Hash Algorithm
C is correct, Symmetric Algorithms use the same key to encrypt and decrypt.
15 The attribute that prevents someone from later denying their actions is called what? A. Nonrepudiation B. Key Escrow C. Crytical Redundancy Check D. Two-Factor Authentification
A is correct, nonrepudiation prohibits people from denying their actions.
B,C,D, are incorrect. These are all terms used in cryptography but do not relate to the concept of repudiation and nonrepudiation.
60
Which of hte following is a reason given for limiting an object’s privileges as part of the principle of least priviledge?
A. It makes it easier to assign blame if a problem occurs.
B. It limits the amount of harm that can be caused, thus limiting an organization’s exposure to damage.
C. it simplifies the job of security administrators
D. It consolodates responsibility
with a few key individuals, thus making security decisions easier to make.
B. is correct, this is the primary reason given for implementing the concept of least privilege.
88
Acceptable use policies are used to define
A. Data retention
B. Server consolidation planning
C. Security personnel responsibilities for network protection
D. All user responsibilities
D is correct, an acceptable use policy defines all user responsibilities with respect to using IT resources.