Security+ Questions Flashcards
A periodic update that corrects problems in one version of a product is called a(n) _________.
Service Pack
Which device monitors network traffic in a passive manner? A. Sniffer B. IDS C. Firewall D. Web Browser
B.
What is a system that is intended or designed to be broken into by an attacker?
A. Honeypot
B. Honeybucket
C. Decoy
D. Spoofing system
E. Deleted if the employee has been terminated
A.
In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization? A. Supervisor B. Administrator C. Root D. Director
B.
You are a junior security administrator for a large bank. You have been asked to make the database servers as secure as they can be. The process of making certain that an entity (operating system, application, and so on) is as secure as it can be is known as which of the following? A. Stabilizing B. Reinforcing C. Hardening D. Toughening
C.
John is working on designing a network for the insurance company where he is employed. He wants to put the web server in an area that has somewhat less security so that other users might access it. But he does not want that to compromise the security of the rest of the network. what would be John’s best approach?
A. Place the web server in a honeynet.
B. Place the web server on the guest network segment,
C. Place the web server in a DMZ.
D. Place the web server outside his network.
C.
Tom has been instructed to find a security standard, applicable to the United States, that will help him develop appropriate security policies. He has found a standard that describes 8 principles and 14 practices that can be used to develop security policies. What standard is Tom most likely reviewing? A. ISO/IEC 27001:2013 B. NIST 800-12 C. NIST 800-14 D. ISA/IEC-62443 4
C.
Juanita is implementing a security mechanism that will fully encrypt the hard drive of laptops in her organization. The encryption and decryption will be automatic. What best describes what Juanita is implementing? A. AES B. TPM C. FDE D. SED
D.
Ahmed has been working to mitigate the threat of malware in his network. He has selected a specific vendor (Vendor ABC) for his antivirus software. He is using ABC products everywhere he needs antivirus software. Is this the correct decision? Why or why not?
A. Yes, consistency is more secure.
B. Yes, this will make the process more affordable.
C. No, this violates control diversity.
D. No, this violates vendor diversity.
D.
You are concerned about your backup files becoming infected with malware. Which of the following technologies would be best to protect your backup? A. Air-gap B. SPI firewall C. DMZ D. VLAN
A.
Which of the following devices is the most capable of providing infrastructure security? A. Hub B. Switch C. Router D. Modem
C.
Upper management has decreed that a firewall must be put in place immediately, before you site suffers an attack that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs which functions?
A. Prevents unauthorized packets from entering the network
B. Allows all packets to leave the network
C. Allows all packets to enter the network
D. Eliminates collisions in the network
A.
Which device stores information about destinations in a network (choose the best answer)? A. Hub B. Modem C. Firewall D. Router
D.
As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You're preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency? A. Hub B. Switch C. Router D. PBX
B.
You've been notified that you'll soon be transferred to another site. Before you leave, you're to audit the network and document everything in use and the reason why it's in use. The next administrator will use this documentation to keep the network running. Which of the following protocols isn't a tunneling protocol but is probably used at your site by tunneling protocols for network security? A. IPSec B. PPTP C. L2TP D. L2F
A.
Which of the following can be implemented as a software or hardware solution and is usually associated with a device--a router, a firewall, NAT, and so on--used to shift a load from one device to another? A. Proxy B. Hub C. Load Balancer D. Switch
C.
Which of the following are multiport devices that improve network efficiency? A. Switches B. Modems C. Gateways D. Concentrators
A.
Which IDS system uses algorithms to analyze the traffic passing through the network? A. Arithmetical B. Algebraic C. Statistical D. Heuristic
D.
Which of the following can be used to offload the public-key encryption to a separate hardware plug-in card? A. SSL Accelerator B. Load Balancer C. Proxy Firewall D. SIEM
A.
Which of the following protections implies that information, once written, cannot be modified? A. DLP B. ROM C. WORM D. NAC
C.
In which two modes can IPSec work? A. Tunneling and Storing B. Transport and Storing C. Tunneling and Transport D. At-Rest and At-Ease
C.
With which tunnel configuration are only some (usually all incoming) requests routed and encrypted over the VPN? A. Split B. Full C. Partial D. Hybrid
A.
With which type of load balance scheduling is the first client request sent to the first group of servers, the second is sent to the second, and so on? A. Affinity B. Round-robin C. Sequential D. Progressive
B.
Which type of load balancing configuration means that more than one load balancing server is working at all times to handle the load/requests as they come in? A. Active-active B. Cooperative-sharing C. Equal Partner D. Proactive-colleague
A.