Shared Flashcard Set

Details

Security + 2011 Objectives
CompTIA Security + 2011 Objectives
25
Other
Professional
12/15/2011

Additional Other Flashcards

 


 

Cards

Term

Actively monitoring data streams in search of malicious code or behavior is an example of:

 

A. load balancing

B. an Internet proxy

C. URL filtering

D. content inspection

Definition

D. content inspection

Term

Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?

A. Firewall

B. NIDS

C. NIPS

D. HIDS

Definition

B. NIDS

Term

The security adminsitrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspious traffic on the network. Which of the following is the MOST likely cause?

 

A. NIPS is blocking activities from those specific websites

B. NIDS is blocking activities from those specific websites

C. The firewall is blocking web activitiy

D. The router is denying all traffic from those sites

Definition

A. NIPS is blocking activities from those specific websites

Term

Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?

 

A. Protocol analyzer

B. Port scanner

C. Vulnerability scanner

D. Honeypot

Definition

A. Protocol analyzer

Term

Which of the following can a security adminsitrator implement to help identify smurf attacks?

 

A. Load Balancer

B. Spam filters

C. NIDS

D. Firewall

Definition
C. NIDS
Term
Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer? (Choose TWO)

A. MAC filtering
B. Disabled SSID broadcast
C. WPA2-Enterprise
D. EAP-TLS
E. WEP with 802.1x
Definition
A. MAC filtering
B. Disabled SSID broadcast
Term
Which of the following functions is MOST likely performed by a web security gateway?

A. Protocol analyzer
B. Content filtering
C. Spam filter
D. Flood guard
Definition
B. Content filtering
Term
Which of the following devices is often used to cache and filter content?

A. Proxies
B. Firewall
C. VPN
D. Load balancer
Definition
A. Proxies
Term
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO) A. Subnetting B. NAT C. Firewall D. NAC E. VPN
Definition
C. Firewall E. VPN
Term
Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?

A. Load balancer
B. URL filer
C. VPN concentrator
D. Protocol Analyzer
Definition
A. Load balancer
Term
An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?

A. Software based firewall
B. Mandatory Access Control (MAC)
C. VPN Concentrator
D. Web security gateway
Definition
C. VPN Concentrator
Term
Which of the following should be installed to prevent employees from receiving unsolicited emails?

A. Pop-up blockers
B. Virus definitions
C. Spyware definitions
D. Spam filters
Definition
D. Spam filters
Term
Which of the following should a security adminsitrator implement to prevent users from disrupting network connectivity, if a user connects both ends of a network cable to different switch ports?

A. VLAN seperation
B. Access Control
C. Loop protection
D. DMZ
Definition
C. Loop protection
Term
A user is no longer able to transfer files to the FTP server. The security adminstrator has verified the ports are open on the network firewall. Which of the following should the security adminsitrator check?

A. Anti-virus software
B. ACLs
C. Anti-spam software
D. NIDS
Definition
B. ACLs
Term
Which of the following BEST describes the proper method and reason to implement port security?

A. Apply security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network
B. Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network
C. Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network
D. Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network
Definition
A. Apply security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network
Term
Which of the following would need to be configured correctly to allow remote access to the network?

A. ACLs
B. Kerberos
C. Tokens
D. Biometrics
Definition
A. ACLs
Term
By default, which of the following stops network traffic when the traffic is not identified in the firewall ruleset?

A. Access Control Lists
B. Explicit Allow
C. Explicity Deny
D. Implicit Deny
Definition
D. Implicit Deny
Term
Based on logs from file servers, remote access systems, and IDS, a malicous insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider's lawyer insists the laptop cannot be identified. Which of the following would BEST be used to identify the specific computer used by the insider?

A. IP address
B. User profiles
C. MAC address
D. Computer name
Definition
C. MAC address
Term
Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implentation of which of the following?

A. Virtualization
B. Port security
C. IPSec
D. Firewall rules
Definition
D. Firewall rules
Term
Which of the following is the default rule found in a corporate firewall's access control list?

A. Anti-spoofing
B. Permit all
C. Multicast list
D. Deny all
Definition
D. Deny all
Term
Which of the following is BEST used to prevent ARP poisoning attacks across a network?

A. VLAN segregation
B. IPSec
C. IP filters
D. Log analysis
Definition
A. VLAN segregation
Term
A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional personel and minimize the footprint in their current datacenter?

A. Allow users to telecommute
B. Setup a load balancer
C. Infrastructure as a Service
D. Software as a Service
Definition
D.Software as a Service
Term
Which of the following is MOST likely to be the last rule contained on any firewall?

A. IP allow any any
B. Implicit Deny
C. Seperation of duties
D. Time of day restricitions
Definition
B. Implicit Deny
Term
Which of the following cloud computing concepts is the BEST described as providing an easy-to-configure OS and on-deman computing for customers?

A. Platform as a Service
B. Software as a Service
C. Inrastructure as a Service
D. Trusted OS as a Service
Definition
A. Platform as a Service
Term
MAC filtering is a form of which of the following?

A. Virtualization
B. Network Access Control
C. Virtual Private Networking
D. Network Address Translation
Definition
B. Network Access Control
Supporting users have an ad free experience!