SlideShare uma empresa Scribd logo
1 de 51
Chapter 4 Review
McKinley Technology High School – Ms. Wiscount
What can an administrator use to detect
malicious activity after it occurred?
• Firewall

• Sniffer
• Port scanner
• IDS
Of the following choices, what would
detect compromises on a local server?
• HIDS
• NIPS
• Firewall

• Protocol Analyzer
Of the following choices, what represents
the best choice for a system to detect
attacks on a network, but not block them?

• NIDS
• NIPS
• HIDS

• HIPS
Your organization is using a NIDS. The NIDS vendor
regularly provides updates for the NIDS to detect
known attacks. What type of NIDS is this?

• Anomaly-based
• Signature-based
• Prevention-based

• Honey-based
You are preparing to deploy an anomaly-based
detection system to monitor network activity.
What would you create first?

• Flood guards
• Signatures
• Baseline

• Honeypot
Of the following choices, what can you use to divert
malicious attacks on your networks away from valuable
resources to relatively worthless resources?

• IDS
• Proxy server
• Web application firewall

• Honeypot
Of the following choices, what best describes
the function of an IPS?
• Detect attacks
• Stop attacks in progress
• Prevent attackers from attacking

• Notify appropriate personnel of attacks
Of the following choices, what provides active
protection for an operating system?
• NIDS
• NIPS
• HIDS

• HIPS
Of the following choices, what most accurately
describes a NIPS?
• Detects and takes action against threats
• Provides notification of threats
• Detects and eliminates threats

• Identifies zero day vulnerabilities
You’ve recently completed a wireless audit and
realize that the wireless signal from your company’s
WAP reaches the parking lot. What can you do to
ensures that the signal doesn’t reach outside your
building?

• Increase the WAP’s power level
• Decrease the WAP’s power level

• Enable SSID broadcasting
• Disable SSID broadcasting
Which of the following secure protocols did WEP
implement incorrectly, allowing attackers to crack
it?

• SSL
• RC4

• CCMP
• AES
Your organization is designing an 802.11n network and
wants to use the strongest security. What would you
recommend?

• FTPS
• SSL

• WEP
• WPA2
Which of the following authentication mechanisms can
provide centralized authentication for a wireless
network?

• WPA2
• RADIUS

• Multifactor authentication
• Kerberos
You want to ensure that only specific wireless
clients can access your wireless networks. Of the
following choices, what provides the best solution?

• MAC filtering
• Content filtering

• NAT
• NIPS
You recently completed a wireless audit of your
company’s wireless network. You’ve identified several
unknown devices connected to the network and realize
they are devices owned by company employees. What can
you use to prevent these devices from connecting?

• MAC filtering
• Enable SSID broadcast

• Enable isolation mode on the WAP
• Reduce the power levels on the WAP
What can you do to prevent the easy discovery of
a WAP?
• Enable MAC filtering
• Disable SSID broadcast

• Enable SSID broadcast
• Enable 802.1X authentication
What troubleshooting a problem with a WAP in your
organization, you discover a rogue access point with
the same SSID as the organization’s WAP. What is the
second access point?

• IDS
• War chalking

• Evil twin
• Packet sniffer
You want to identify the physical location of a rogue
access point you discovered in the footprint of your
company. What would you use?

• Bluesnarfing
• Bluejacking

• War chalking
• War driving
You are hosting a wireless hotspot, and you want to
segment wireless users from each other. What should
you use?

• Personal mode
• Enterprise mode

• Isolation mode
• WEP
Which of the following best describes
bluejacking?
• Bluejacking involves accessing data on a phone
• Bluejacking involves checking a WAP’s antenna
placement, power levels and encryption
techniques
• Bluejacking involves sending unsolicited messages
to a phone

• Bluejacking involves a rogue access point with the
same SSID as your production WAP
Someone stole an executive’s smartphone, and the
phone includes sensitive data. What should you do to
prevent the thief from reading the data?

• Password protect the phone
• Encrypt the data on the phone
• Use remote wipe
• Track the location of the phone
You are deploying a remote access server for your
organization. Employees will use this to access the
network while on the road. Of the following choices,
what must you configure?

• NAC
• ACLs

• MACs
• NAT-T
Your organization is creating a site-to-site VPN
tunnel between the main business location and a
remote office. What can it use to create the tunnel?

• WAP2-Enterprise
• RADIUS

• NAC
• IPsec
You are planning to deploy a VPN with IPsec. Users
will use the VPN to access corporate resources while
they are on the road. How should you use IPsec?

• With AH in tunnel mode
• With AH in transport mode

• With ESP in tunnel mode
• With ESP in transport mode
An employee connect to the corporate network using a
VPN. However, the client is not able to access
internal resources, but instead receives a warning
indicating their system is not up to date with
current patches. What is causing the behavior?

• The VPN is using IPsec
• The VPN is not using IPsec

• NAC is disabled on the network and remediation
must take place before the client can access
internal resources
• NAC is enabled on the network and remdeiation
must take place before the client can access
internal resources
In order to provide flexible working conditions, a
company has decided to allow some employees
remote access into corporate headquarters. Which of
the following security technologies could be
used to provide remote access? (Select TWO).

• Subnetting
• NAT

• Firewall
• NAC
• VPN
Which of the following can prevent an unauthorized
person from accessing the network by
plugging into an open network jack?

• 802.1X
• DHCP

• 802.1q
• NIPS
A targeted email attack sent to Sara, the company’s
Chief Executive Officer (CEO), is known as
which of the following?

• Whaling
• Bluesnarfing

• Vishing
• Dumpster diving
Which of the following specifications would Sara, an
administrator, implement as a network access
control?

• 802.1q
• 802.3

• . 802.11n
• 802.1x
Configuring the mode, encryption methods, and
security associations are part of which of the
following?

• IPSec
• Full disk encryption

• 802.1x
• PKI
Which of the following would an antivirus company use
to efficiently capture and analyze new and
unknown malicious attacks?

• Fuzzer
• IDS

• Proxy
• Honeypot
Which of the following provides the HIGHEST
level of confidentiality on a wireless network?
• Disabling SSID broadcast
• MAC filtering

• WPA2
• Packet switching
Matt, an IT administrator, wants to protect a newly
built server from zero day attacks. Which of the
following would provide the BEST level of protection?

• HIPS
• Antivirus

• NIDS
• ACL
Mike, a network administrator, has been asked to
passively monitor network traffic to the
company’s sales websites. Which of the following
would be BEST suited for this task?

• HIDS
• Firewall

• NIPS
• Spam filter
Mike, a security professional, is tasked with
actively verifying the strength of the security
controls on a company’s live modem pool. Which of the
following activities is MOST appropriate?

• War dialing
• War chalking

• War driving
• Bluesnarfing
Jane, a security administrator, has observed repeated
attempts to break into a server. Which of
the following is designed to stop an intrusion on a
specific server?

• HIPS
• NIDS

• HIDS
• NIPS
Which of the following devices can Sara, an
administrator, implement to detect and stop known
attacks?

• Signature-based NIDS
• Anomaly-based NIDS

• Signature-based NIPS
• Anomaly-based NIPS
While setting up a secure wireless corporate network,
which of the following should Pete, an
administrator, avoid implementing?

• EAP-TLS
• PEAP

• WEP
• WPA
Which of the following are used to implement
VPNs? (Select TWO).
• SFTP
• IPSec

• HTTPS
• SNMP
• SSL
Which of the following describes how Sara, an
attacker, can send unwanted advertisements to a
mobile device?

• Man-in-the-middle
• Bluejacking

• Bluesnarfing
• Packet sniffing
Which of the following protocols can be used to
secure traffic for telecommuters?
• WPA
• IPSec

• ICMP
• SMTP
Which of the following allows Pete, a security
technician, to provide the MOST secure wireless
implementation?

• Implement WPA
• Disable SSID

• Adjust antenna placement
• Implement WEP
Which of the following technologies would allow for a
secure tunneled connection from one site to
another? (Select TWO).

• SFTP
• IPSec

• SSH
• HTTPS
• ICMP
Which of the following network design elements
provides for a one-to-one relationship between an
internal network address and an external network
address?

• NAT
• NAC

• VLAN
• PAT
Which of the following is true concerning WEP
security?
• WEP keys are transmitted in plain text.
• The WEP key initialization process is flawed.

• The pre-shared WEP keys can be cracked with
rainbow tables.
• WEP uses the weak RC4 cipher.
Jane, a security analyst, is reviewing logs from
hosts across the Internet which her company uses
to gather data on new malware. Which of the following
is being implemented by Jane’s company?

• Vulnerability scanner
• Honeynet

• Protocol analyzer
• Port scanner
The information security department regularly walks
the campus and around the buildings looking
for unauthorized open wireless networks. This is an
example of which of the following?

• A site survey
• Antenna placement

• War dialing
• War driving
Matt must come up with a design solution which will
enable remote users to securely access
network resources. Which of the following design
elements will enable Matt to meet this objective?

• DMZ
• VLAN

• VPN
• NAT
Pete, the security engineer, would like to prevent
wireless attacks on his network. Pete has
implemented a security control to limit the
connecting MAC addresses to a single port. Which of
the following wireless attacks would this address?
• Interference

• Man-in-the-middle

• Evil twin
• Rogue access point
Matt, the security administrator, wants to secure the
wireless network. Which of the following
encryption methods offers the MOST security?
• WPA2 ENT AES

• WPA2 PSK AES

• WPA2 ENT TKIP
• WPA2 PSK TKIP

Mais conteúdo relacionado

Mais procurados

Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Dr. Ahmed Al Zaidy
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementDr. Ahmed Al Zaidy
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 

Mais procurados (20)

Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 

Semelhante a CompTIA Security+ Chapter Four Review

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Securing the cloud
Securing the cloudSecuring the cloud
Securing the cloudZIONSECURITY
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelesskratos2424
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 

Semelhante a CompTIA Security+ Chapter Four Review (20)

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Securing the cloud
Securing the cloudSecuring the cloud
Securing the cloud
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Vp ns
Vp nsVp ns
Vp ns
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
LAN Security
LAN Security LAN Security
LAN Security
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 

Mais de DCPS

Principles of Good Design
Principles of Good DesignPrinciples of Good Design
Principles of Good DesignDCPS
 
Graphic Design Principles
Graphic Design PrinciplesGraphic Design Principles
Graphic Design PrinciplesDCPS
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario CasesDCPS
 
Teaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseTeaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseDCPS
 
Cell phones in the classroom
Cell phones in the classroomCell phones in the classroom
Cell phones in the classroomDCPS
 
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...DCPS
 
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...DCPS
 
NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio DCPS
 
Middle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoMiddle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoDCPS
 
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaTeaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaDCPS
 
Math in the_classroom
Math in the_classroomMath in the_classroom
Math in the_classroomDCPS
 
iMovie
iMovieiMovie
iMovieDCPS
 
LFS and Technology Connections
LFS and Technology ConnectionsLFS and Technology Connections
LFS and Technology ConnectionsDCPS
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the ClassroomDCPS
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the ClassroomDCPS
 
Online Non-Linear Presentations
Online Non-Linear PresentationsOnline Non-Linear Presentations
Online Non-Linear PresentationsDCPS
 
When They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsWhen They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsDCPS
 
Creating podcasts
Creating podcastsCreating podcasts
Creating podcastsDCPS
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytellingDCPS
 
File conversion
File conversionFile conversion
File conversionDCPS
 

Mais de DCPS (20)

Principles of Good Design
Principles of Good DesignPrinciples of Good Design
Principles of Good Design
 
Graphic Design Principles
Graphic Design PrinciplesGraphic Design Principles
Graphic Design Principles
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
 
Teaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseTeaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every Course
 
Cell phones in the classroom
Cell phones in the classroomCell phones in the classroom
Cell phones in the classroom
 
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
 
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
 
NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio
 
Middle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoMiddle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in Chicago
 
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaTeaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
 
Math in the_classroom
Math in the_classroomMath in the_classroom
Math in the_classroom
 
iMovie
iMovieiMovie
iMovie
 
LFS and Technology Connections
LFS and Technology ConnectionsLFS and Technology Connections
LFS and Technology Connections
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the Classroom
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the Classroom
 
Online Non-Linear Presentations
Online Non-Linear PresentationsOnline Non-Linear Presentations
Online Non-Linear Presentations
 
When They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsWhen They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century Skills
 
Creating podcasts
Creating podcastsCreating podcasts
Creating podcasts
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytelling
 
File conversion
File conversionFile conversion
File conversion
 

Último

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

CompTIA Security+ Chapter Four Review

  • 1. Chapter 4 Review McKinley Technology High School – Ms. Wiscount
  • 2. What can an administrator use to detect malicious activity after it occurred? • Firewall • Sniffer • Port scanner • IDS
  • 3. Of the following choices, what would detect compromises on a local server? • HIDS • NIPS • Firewall • Protocol Analyzer
  • 4. Of the following choices, what represents the best choice for a system to detect attacks on a network, but not block them? • NIDS • NIPS • HIDS • HIPS
  • 5. Your organization is using a NIDS. The NIDS vendor regularly provides updates for the NIDS to detect known attacks. What type of NIDS is this? • Anomaly-based • Signature-based • Prevention-based • Honey-based
  • 6. You are preparing to deploy an anomaly-based detection system to monitor network activity. What would you create first? • Flood guards • Signatures • Baseline • Honeypot
  • 7. Of the following choices, what can you use to divert malicious attacks on your networks away from valuable resources to relatively worthless resources? • IDS • Proxy server • Web application firewall • Honeypot
  • 8. Of the following choices, what best describes the function of an IPS? • Detect attacks • Stop attacks in progress • Prevent attackers from attacking • Notify appropriate personnel of attacks
  • 9. Of the following choices, what provides active protection for an operating system? • NIDS • NIPS • HIDS • HIPS
  • 10. Of the following choices, what most accurately describes a NIPS? • Detects and takes action against threats • Provides notification of threats • Detects and eliminates threats • Identifies zero day vulnerabilities
  • 11. You’ve recently completed a wireless audit and realize that the wireless signal from your company’s WAP reaches the parking lot. What can you do to ensures that the signal doesn’t reach outside your building? • Increase the WAP’s power level • Decrease the WAP’s power level • Enable SSID broadcasting • Disable SSID broadcasting
  • 12. Which of the following secure protocols did WEP implement incorrectly, allowing attackers to crack it? • SSL • RC4 • CCMP • AES
  • 13. Your organization is designing an 802.11n network and wants to use the strongest security. What would you recommend? • FTPS • SSL • WEP • WPA2
  • 14. Which of the following authentication mechanisms can provide centralized authentication for a wireless network? • WPA2 • RADIUS • Multifactor authentication • Kerberos
  • 15. You want to ensure that only specific wireless clients can access your wireless networks. Of the following choices, what provides the best solution? • MAC filtering • Content filtering • NAT • NIPS
  • 16. You recently completed a wireless audit of your company’s wireless network. You’ve identified several unknown devices connected to the network and realize they are devices owned by company employees. What can you use to prevent these devices from connecting? • MAC filtering • Enable SSID broadcast • Enable isolation mode on the WAP • Reduce the power levels on the WAP
  • 17. What can you do to prevent the easy discovery of a WAP? • Enable MAC filtering • Disable SSID broadcast • Enable SSID broadcast • Enable 802.1X authentication
  • 18. What troubleshooting a problem with a WAP in your organization, you discover a rogue access point with the same SSID as the organization’s WAP. What is the second access point? • IDS • War chalking • Evil twin • Packet sniffer
  • 19. You want to identify the physical location of a rogue access point you discovered in the footprint of your company. What would you use? • Bluesnarfing • Bluejacking • War chalking • War driving
  • 20. You are hosting a wireless hotspot, and you want to segment wireless users from each other. What should you use? • Personal mode • Enterprise mode • Isolation mode • WEP
  • 21. Which of the following best describes bluejacking? • Bluejacking involves accessing data on a phone • Bluejacking involves checking a WAP’s antenna placement, power levels and encryption techniques • Bluejacking involves sending unsolicited messages to a phone • Bluejacking involves a rogue access point with the same SSID as your production WAP
  • 22. Someone stole an executive’s smartphone, and the phone includes sensitive data. What should you do to prevent the thief from reading the data? • Password protect the phone • Encrypt the data on the phone • Use remote wipe • Track the location of the phone
  • 23. You are deploying a remote access server for your organization. Employees will use this to access the network while on the road. Of the following choices, what must you configure? • NAC • ACLs • MACs • NAT-T
  • 24. Your organization is creating a site-to-site VPN tunnel between the main business location and a remote office. What can it use to create the tunnel? • WAP2-Enterprise • RADIUS • NAC • IPsec
  • 25. You are planning to deploy a VPN with IPsec. Users will use the VPN to access corporate resources while they are on the road. How should you use IPsec? • With AH in tunnel mode • With AH in transport mode • With ESP in tunnel mode • With ESP in transport mode
  • 26. An employee connect to the corporate network using a VPN. However, the client is not able to access internal resources, but instead receives a warning indicating their system is not up to date with current patches. What is causing the behavior? • The VPN is using IPsec • The VPN is not using IPsec • NAC is disabled on the network and remediation must take place before the client can access internal resources • NAC is enabled on the network and remdeiation must take place before the client can access internal resources
  • 27. In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). • Subnetting • NAT • Firewall • NAC • VPN
  • 28. Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? • 802.1X • DHCP • 802.1q • NIPS
  • 29. A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as which of the following? • Whaling • Bluesnarfing • Vishing • Dumpster diving
  • 30. Which of the following specifications would Sara, an administrator, implement as a network access control? • 802.1q • 802.3 • . 802.11n • 802.1x
  • 31. Configuring the mode, encryption methods, and security associations are part of which of the following? • IPSec • Full disk encryption • 802.1x • PKI
  • 32. Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks? • Fuzzer • IDS • Proxy • Honeypot
  • 33. Which of the following provides the HIGHEST level of confidentiality on a wireless network? • Disabling SSID broadcast • MAC filtering • WPA2 • Packet switching
  • 34. Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection? • HIPS • Antivirus • NIDS • ACL
  • 35. Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? • HIDS • Firewall • NIPS • Spam filter
  • 36. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? • War dialing • War chalking • War driving • Bluesnarfing
  • 37. Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? • HIPS • NIDS • HIDS • NIPS
  • 38. Which of the following devices can Sara, an administrator, implement to detect and stop known attacks? • Signature-based NIDS • Anomaly-based NIDS • Signature-based NIPS • Anomaly-based NIPS
  • 39. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? • EAP-TLS • PEAP • WEP • WPA
  • 40. Which of the following are used to implement VPNs? (Select TWO). • SFTP • IPSec • HTTPS • SNMP • SSL
  • 41. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? • Man-in-the-middle • Bluejacking • Bluesnarfing • Packet sniffing
  • 42. Which of the following protocols can be used to secure traffic for telecommuters? • WPA • IPSec • ICMP • SMTP
  • 43. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? • Implement WPA • Disable SSID • Adjust antenna placement • Implement WEP
  • 44. Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO). • SFTP • IPSec • SSH • HTTPS • ICMP
  • 45. Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address? • NAT • NAC • VLAN • PAT
  • 46. Which of the following is true concerning WEP security? • WEP keys are transmitted in plain text. • The WEP key initialization process is flawed. • The pre-shared WEP keys can be cracked with rainbow tables. • WEP uses the weak RC4 cipher.
  • 47. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? • Vulnerability scanner • Honeynet • Protocol analyzer • Port scanner
  • 48. The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an example of which of the following? • A site survey • Antenna placement • War dialing • War driving
  • 49. Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements will enable Matt to meet this objective? • DMZ • VLAN • VPN • NAT
  • 50. Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? • Interference • Man-in-the-middle • Evil twin • Rogue access point
  • 51. Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? • WPA2 ENT AES • WPA2 PSK AES • WPA2 ENT TKIP • WPA2 PSK TKIP