SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Chapter 4 Review
McKinley Technology High School – Ms. Wiscount
What can an administrator use to detect
malicious activity after it occurred?
• Firewall

• Sniffer
• Port scanner
• IDS
Of the following choices, what would
detect compromises on a local server?
• HIDS
• NIPS
• Firewall

• Protocol Analyzer
Of the following choices, what represents
the best choice for a system to detect
attacks on a network, but not block them?

• NIDS
• NIPS
• HIDS

• HIPS
Your organization is using a NIDS. The NIDS vendor
regularly provides updates for the NIDS to detect
known attacks. What type of NIDS is this?

• Anomaly-based
• Signature-based
• Prevention-based

• Honey-based
You are preparing to deploy an anomaly-based
detection system to monitor network activity.
What would you create first?

• Flood guards
• Signatures
• Baseline

• Honeypot
Of the following choices, what can you use to divert
malicious attacks on your networks away from valuable
resources to relatively worthless resources?

• IDS
• Proxy server
• Web application firewall

• Honeypot
Of the following choices, what best describes
the function of an IPS?
• Detect attacks
• Stop attacks in progress
• Prevent attackers from attacking

• Notify appropriate personnel of attacks
Of the following choices, what provides active
protection for an operating system?
• NIDS
• NIPS
• HIDS

• HIPS
Of the following choices, what most accurately
describes a NIPS?
• Detects and takes action against threats
• Provides notification of threats
• Detects and eliminates threats

• Identifies zero day vulnerabilities
You’ve recently completed a wireless audit and
realize that the wireless signal from your company’s
WAP reaches the parking lot. What can you do to
ensures that the signal doesn’t reach outside your
building?

• Increase the WAP’s power level
• Decrease the WAP’s power level

• Enable SSID broadcasting
• Disable SSID broadcasting
Which of the following secure protocols did WEP
implement incorrectly, allowing attackers to crack
it?

• SSL
• RC4

• CCMP
• AES
Your organization is designing an 802.11n network and
wants to use the strongest security. What would you
recommend?

• FTPS
• SSL

• WEP
• WPA2
Which of the following authentication mechanisms can
provide centralized authentication for a wireless
network?

• WPA2
• RADIUS

• Multifactor authentication
• Kerberos
You want to ensure that only specific wireless
clients can access your wireless networks. Of the
following choices, what provides the best solution?

• MAC filtering
• Content filtering

• NAT
• NIPS
You recently completed a wireless audit of your
company’s wireless network. You’ve identified several
unknown devices connected to the network and realize
they are devices owned by company employees. What can
you use to prevent these devices from connecting?

• MAC filtering
• Enable SSID broadcast

• Enable isolation mode on the WAP
• Reduce the power levels on the WAP
What can you do to prevent the easy discovery of
a WAP?
• Enable MAC filtering
• Disable SSID broadcast

• Enable SSID broadcast
• Enable 802.1X authentication
What troubleshooting a problem with a WAP in your
organization, you discover a rogue access point with
the same SSID as the organization’s WAP. What is the
second access point?

• IDS
• War chalking

• Evil twin
• Packet sniffer
You want to identify the physical location of a rogue
access point you discovered in the footprint of your
company. What would you use?

• Bluesnarfing
• Bluejacking

• War chalking
• War driving
You are hosting a wireless hotspot, and you want to
segment wireless users from each other. What should
you use?

• Personal mode
• Enterprise mode

• Isolation mode
• WEP
Which of the following best describes
bluejacking?
• Bluejacking involves accessing data on a phone
• Bluejacking involves checking a WAP’s antenna
placement, power levels and encryption
techniques
• Bluejacking involves sending unsolicited messages
to a phone

• Bluejacking involves a rogue access point with the
same SSID as your production WAP
Someone stole an executive’s smartphone, and the
phone includes sensitive data. What should you do to
prevent the thief from reading the data?

• Password protect the phone
• Encrypt the data on the phone
• Use remote wipe
• Track the location of the phone
You are deploying a remote access server for your
organization. Employees will use this to access the
network while on the road. Of the following choices,
what must you configure?

• NAC
• ACLs

• MACs
• NAT-T
Your organization is creating a site-to-site VPN
tunnel between the main business location and a
remote office. What can it use to create the tunnel?

• WAP2-Enterprise
• RADIUS

• NAC
• IPsec
You are planning to deploy a VPN with IPsec. Users
will use the VPN to access corporate resources while
they are on the road. How should you use IPsec?

• With AH in tunnel mode
• With AH in transport mode

• With ESP in tunnel mode
• With ESP in transport mode
An employee connect to the corporate network using a
VPN. However, the client is not able to access
internal resources, but instead receives a warning
indicating their system is not up to date with
current patches. What is causing the behavior?

• The VPN is using IPsec
• The VPN is not using IPsec

• NAC is disabled on the network and remediation
must take place before the client can access
internal resources
• NAC is enabled on the network and remdeiation
must take place before the client can access
internal resources
In order to provide flexible working conditions, a
company has decided to allow some employees
remote access into corporate headquarters. Which of
the following security technologies could be
used to provide remote access? (Select TWO).

• Subnetting
• NAT

• Firewall
• NAC
• VPN
Which of the following can prevent an unauthorized
person from accessing the network by
plugging into an open network jack?

• 802.1X
• DHCP

• 802.1q
• NIPS
A targeted email attack sent to Sara, the company’s
Chief Executive Officer (CEO), is known as
which of the following?

• Whaling
• Bluesnarfing

• Vishing
• Dumpster diving
Which of the following specifications would Sara, an
administrator, implement as a network access
control?

• 802.1q
• 802.3

• . 802.11n
• 802.1x
Configuring the mode, encryption methods, and
security associations are part of which of the
following?

• IPSec
• Full disk encryption

• 802.1x
• PKI
Which of the following would an antivirus company use
to efficiently capture and analyze new and
unknown malicious attacks?

• Fuzzer
• IDS

• Proxy
• Honeypot
Which of the following provides the HIGHEST
level of confidentiality on a wireless network?
• Disabling SSID broadcast
• MAC filtering

• WPA2
• Packet switching
Matt, an IT administrator, wants to protect a newly
built server from zero day attacks. Which of the
following would provide the BEST level of protection?

• HIPS
• Antivirus

• NIDS
• ACL
Mike, a network administrator, has been asked to
passively monitor network traffic to the
company’s sales websites. Which of the following
would be BEST suited for this task?

• HIDS
• Firewall

• NIPS
• Spam filter
Mike, a security professional, is tasked with
actively verifying the strength of the security
controls on a company’s live modem pool. Which of the
following activities is MOST appropriate?

• War dialing
• War chalking

• War driving
• Bluesnarfing
Jane, a security administrator, has observed repeated
attempts to break into a server. Which of
the following is designed to stop an intrusion on a
specific server?

• HIPS
• NIDS

• HIDS
• NIPS
Which of the following devices can Sara, an
administrator, implement to detect and stop known
attacks?

• Signature-based NIDS
• Anomaly-based NIDS

• Signature-based NIPS
• Anomaly-based NIPS
While setting up a secure wireless corporate network,
which of the following should Pete, an
administrator, avoid implementing?

• EAP-TLS
• PEAP

• WEP
• WPA
Which of the following are used to implement
VPNs? (Select TWO).
• SFTP
• IPSec

• HTTPS
• SNMP
• SSL
Which of the following describes how Sara, an
attacker, can send unwanted advertisements to a
mobile device?

• Man-in-the-middle
• Bluejacking

• Bluesnarfing
• Packet sniffing
Which of the following protocols can be used to
secure traffic for telecommuters?
• WPA
• IPSec

• ICMP
• SMTP
Which of the following allows Pete, a security
technician, to provide the MOST secure wireless
implementation?

• Implement WPA
• Disable SSID

• Adjust antenna placement
• Implement WEP
Which of the following technologies would allow for a
secure tunneled connection from one site to
another? (Select TWO).

• SFTP
• IPSec

• SSH
• HTTPS
• ICMP
Which of the following network design elements
provides for a one-to-one relationship between an
internal network address and an external network
address?

• NAT
• NAC

• VLAN
• PAT
Which of the following is true concerning WEP
security?
• WEP keys are transmitted in plain text.
• The WEP key initialization process is flawed.

• The pre-shared WEP keys can be cracked with
rainbow tables.
• WEP uses the weak RC4 cipher.
Jane, a security analyst, is reviewing logs from
hosts across the Internet which her company uses
to gather data on new malware. Which of the following
is being implemented by Jane’s company?

• Vulnerability scanner
• Honeynet

• Protocol analyzer
• Port scanner
The information security department regularly walks
the campus and around the buildings looking
for unauthorized open wireless networks. This is an
example of which of the following?

• A site survey
• Antenna placement

• War dialing
• War driving
Matt must come up with a design solution which will
enable remote users to securely access
network resources. Which of the following design
elements will enable Matt to meet this objective?

• DMZ
• VLAN

• VPN
• NAT
Pete, the security engineer, would like to prevent
wireless attacks on his network. Pete has
implemented a security control to limit the
connecting MAC addresses to a single port. Which of
the following wireless attacks would this address?
• Interference

• Man-in-the-middle

• Evil twin
• Rogue access point
Matt, the security administrator, wants to secure the
wireless network. Which of the following
encryption methods offers the MOST security?
• WPA2 ENT AES

• WPA2 PSK AES

• WPA2 ENT TKIP
• WPA2 PSK TKIP

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 PresentationAmy McMullin
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08Amy McMullin
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 PresentationAmy McMullin
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceCengage Learning
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 PresentationAmy McMullin
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglyAlgoSec
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Dr. Ahmed Al Zaidy
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementDr. Ahmed Al Zaidy
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksDr. Ahmed Al Zaidy
 

Was ist angesagt? (20)

Chapter 12 Presentation
Chapter 12 PresentationChapter 12 Presentation
Chapter 12 Presentation
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 5 Presentation
Chapter 5 PresentationChapter 5 Presentation
Chapter 5 Presentation
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network Chapter 7 Administering a Secure Network
Chapter 7 Administering a Secure Network
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
Chapter 11 Authentication and Account Management
Chapter 11 Authentication and Account ManagementChapter 11 Authentication and Account Management
Chapter 11 Authentication and Account Management
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 

Ähnlich wie CompTIA Security+ Chapter Four Review

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
Securing the cloud
Securing the cloudSecuring the cloud
Securing the cloudZIONSECURITY
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolIssar Kapadia
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceSagi Brody
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)Aj Maurya
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelesskratos2424
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 

Ähnlich wie CompTIA Security+ Chapter Four Review (20)

Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Securing the cloud
Securing the cloudSecuring the cloud
Securing the cloud
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Vp ns
Vp nsVp ns
Vp ns
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Ransomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-ServiceRansomware-Recovery-as-a-Service
Ransomware-Recovery-as-a-Service
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
LAN Security
LAN Security LAN Security
LAN Security
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 

Mehr von DCPS

Principles of Good Design
Principles of Good DesignPrinciples of Good Design
Principles of Good DesignDCPS
 
Graphic Design Principles
Graphic Design PrinciplesGraphic Design Principles
Graphic Design PrinciplesDCPS
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario CasesDCPS
 
Teaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseTeaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseDCPS
 
Cell phones in the classroom
Cell phones in the classroomCell phones in the classroom
Cell phones in the classroomDCPS
 
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...DCPS
 
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...DCPS
 
NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio DCPS
 
Middle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoMiddle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoDCPS
 
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaTeaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaDCPS
 
Math in the_classroom
Math in the_classroomMath in the_classroom
Math in the_classroomDCPS
 
iMovie
iMovieiMovie
iMovieDCPS
 
LFS and Technology Connections
LFS and Technology ConnectionsLFS and Technology Connections
LFS and Technology ConnectionsDCPS
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the ClassroomDCPS
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the ClassroomDCPS
 
Online Non-Linear Presentations
Online Non-Linear PresentationsOnline Non-Linear Presentations
Online Non-Linear PresentationsDCPS
 
When They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsWhen They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsDCPS
 
Creating podcasts
Creating podcastsCreating podcasts
Creating podcastsDCPS
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytellingDCPS
 
File conversion
File conversionFile conversion
File conversionDCPS
 

Mehr von DCPS (20)

Principles of Good Design
Principles of Good DesignPrinciples of Good Design
Principles of Good Design
 
Graphic Design Principles
Graphic Design PrinciplesGraphic Design Principles
Graphic Design Principles
 
Copyright Scenario Cases
Copyright Scenario CasesCopyright Scenario Cases
Copyright Scenario Cases
 
Teaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every CourseTeaching Emerging Technologies in Every Course
Teaching Emerging Technologies in Every Course
 
Cell phones in the classroom
Cell phones in the classroomCell phones in the classroom
Cell phones in the classroom
 
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...Online Testing: An Authentic Twist to Traditional Assessment  - Bloomsburg Un...
Online Testing: An Authentic Twist to Traditional Assessment - Bloomsburg Un...
 
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
How Can We Digitally Engage & Energize our Students in 45 Days - NBEA 2007 Co...
 
NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio NBEA 2008 Convention in San Antonio
NBEA 2008 Convention in San Antonio
 
Middle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in ChicagoMiddle School Career Education NBEA 2009 Convention in Chicago
Middle School Career Education NBEA 2009 Convention in Chicago
 
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 PhiladelphiaTeaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
Teaching an HS Emerging Technologies Course - ISTE 2011 Philadelphia
 
Math in the_classroom
Math in the_classroomMath in the_classroom
Math in the_classroom
 
iMovie
iMovieiMovie
iMovie
 
LFS and Technology Connections
LFS and Technology ConnectionsLFS and Technology Connections
LFS and Technology Connections
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the Classroom
 
Google Docs in the Classroom
Google Docs in the ClassroomGoogle Docs in the Classroom
Google Docs in the Classroom
 
Online Non-Linear Presentations
Online Non-Linear PresentationsOnline Non-Linear Presentations
Online Non-Linear Presentations
 
When They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century SkillsWhen They're Not Looking....Throw in 21st Century Skills
When They're Not Looking....Throw in 21st Century Skills
 
Creating podcasts
Creating podcastsCreating podcasts
Creating podcasts
 
Digital storytelling
Digital storytellingDigital storytelling
Digital storytelling
 
File conversion
File conversionFile conversion
File conversion
 

Kürzlich hochgeladen

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

CompTIA Security+ Chapter Four Review

  • 1. Chapter 4 Review McKinley Technology High School – Ms. Wiscount
  • 2. What can an administrator use to detect malicious activity after it occurred? • Firewall • Sniffer • Port scanner • IDS
  • 3. Of the following choices, what would detect compromises on a local server? • HIDS • NIPS • Firewall • Protocol Analyzer
  • 4. Of the following choices, what represents the best choice for a system to detect attacks on a network, but not block them? • NIDS • NIPS • HIDS • HIPS
  • 5. Your organization is using a NIDS. The NIDS vendor regularly provides updates for the NIDS to detect known attacks. What type of NIDS is this? • Anomaly-based • Signature-based • Prevention-based • Honey-based
  • 6. You are preparing to deploy an anomaly-based detection system to monitor network activity. What would you create first? • Flood guards • Signatures • Baseline • Honeypot
  • 7. Of the following choices, what can you use to divert malicious attacks on your networks away from valuable resources to relatively worthless resources? • IDS • Proxy server • Web application firewall • Honeypot
  • 8. Of the following choices, what best describes the function of an IPS? • Detect attacks • Stop attacks in progress • Prevent attackers from attacking • Notify appropriate personnel of attacks
  • 9. Of the following choices, what provides active protection for an operating system? • NIDS • NIPS • HIDS • HIPS
  • 10. Of the following choices, what most accurately describes a NIPS? • Detects and takes action against threats • Provides notification of threats • Detects and eliminates threats • Identifies zero day vulnerabilities
  • 11. You’ve recently completed a wireless audit and realize that the wireless signal from your company’s WAP reaches the parking lot. What can you do to ensures that the signal doesn’t reach outside your building? • Increase the WAP’s power level • Decrease the WAP’s power level • Enable SSID broadcasting • Disable SSID broadcasting
  • 12. Which of the following secure protocols did WEP implement incorrectly, allowing attackers to crack it? • SSL • RC4 • CCMP • AES
  • 13. Your organization is designing an 802.11n network and wants to use the strongest security. What would you recommend? • FTPS • SSL • WEP • WPA2
  • 14. Which of the following authentication mechanisms can provide centralized authentication for a wireless network? • WPA2 • RADIUS • Multifactor authentication • Kerberos
  • 15. You want to ensure that only specific wireless clients can access your wireless networks. Of the following choices, what provides the best solution? • MAC filtering • Content filtering • NAT • NIPS
  • 16. You recently completed a wireless audit of your company’s wireless network. You’ve identified several unknown devices connected to the network and realize they are devices owned by company employees. What can you use to prevent these devices from connecting? • MAC filtering • Enable SSID broadcast • Enable isolation mode on the WAP • Reduce the power levels on the WAP
  • 17. What can you do to prevent the easy discovery of a WAP? • Enable MAC filtering • Disable SSID broadcast • Enable SSID broadcast • Enable 802.1X authentication
  • 18. What troubleshooting a problem with a WAP in your organization, you discover a rogue access point with the same SSID as the organization’s WAP. What is the second access point? • IDS • War chalking • Evil twin • Packet sniffer
  • 19. You want to identify the physical location of a rogue access point you discovered in the footprint of your company. What would you use? • Bluesnarfing • Bluejacking • War chalking • War driving
  • 20. You are hosting a wireless hotspot, and you want to segment wireless users from each other. What should you use? • Personal mode • Enterprise mode • Isolation mode • WEP
  • 21. Which of the following best describes bluejacking? • Bluejacking involves accessing data on a phone • Bluejacking involves checking a WAP’s antenna placement, power levels and encryption techniques • Bluejacking involves sending unsolicited messages to a phone • Bluejacking involves a rogue access point with the same SSID as your production WAP
  • 22. Someone stole an executive’s smartphone, and the phone includes sensitive data. What should you do to prevent the thief from reading the data? • Password protect the phone • Encrypt the data on the phone • Use remote wipe • Track the location of the phone
  • 23. You are deploying a remote access server for your organization. Employees will use this to access the network while on the road. Of the following choices, what must you configure? • NAC • ACLs • MACs • NAT-T
  • 24. Your organization is creating a site-to-site VPN tunnel between the main business location and a remote office. What can it use to create the tunnel? • WAP2-Enterprise • RADIUS • NAC • IPsec
  • 25. You are planning to deploy a VPN with IPsec. Users will use the VPN to access corporate resources while they are on the road. How should you use IPsec? • With AH in tunnel mode • With AH in transport mode • With ESP in tunnel mode • With ESP in transport mode
  • 26. An employee connect to the corporate network using a VPN. However, the client is not able to access internal resources, but instead receives a warning indicating their system is not up to date with current patches. What is causing the behavior? • The VPN is using IPsec • The VPN is not using IPsec • NAC is disabled on the network and remediation must take place before the client can access internal resources • NAC is enabled on the network and remdeiation must take place before the client can access internal resources
  • 27. In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). • Subnetting • NAT • Firewall • NAC • VPN
  • 28. Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? • 802.1X • DHCP • 802.1q • NIPS
  • 29. A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as which of the following? • Whaling • Bluesnarfing • Vishing • Dumpster diving
  • 30. Which of the following specifications would Sara, an administrator, implement as a network access control? • 802.1q • 802.3 • . 802.11n • 802.1x
  • 31. Configuring the mode, encryption methods, and security associations are part of which of the following? • IPSec • Full disk encryption • 802.1x • PKI
  • 32. Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks? • Fuzzer • IDS • Proxy • Honeypot
  • 33. Which of the following provides the HIGHEST level of confidentiality on a wireless network? • Disabling SSID broadcast • MAC filtering • WPA2 • Packet switching
  • 34. Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection? • HIPS • Antivirus • NIDS • ACL
  • 35. Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? • HIDS • Firewall • NIPS • Spam filter
  • 36. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? • War dialing • War chalking • War driving • Bluesnarfing
  • 37. Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? • HIPS • NIDS • HIDS • NIPS
  • 38. Which of the following devices can Sara, an administrator, implement to detect and stop known attacks? • Signature-based NIDS • Anomaly-based NIDS • Signature-based NIPS • Anomaly-based NIPS
  • 39. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? • EAP-TLS • PEAP • WEP • WPA
  • 40. Which of the following are used to implement VPNs? (Select TWO). • SFTP • IPSec • HTTPS • SNMP • SSL
  • 41. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? • Man-in-the-middle • Bluejacking • Bluesnarfing • Packet sniffing
  • 42. Which of the following protocols can be used to secure traffic for telecommuters? • WPA • IPSec • ICMP • SMTP
  • 43. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? • Implement WPA • Disable SSID • Adjust antenna placement • Implement WEP
  • 44. Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO). • SFTP • IPSec • SSH • HTTPS • ICMP
  • 45. Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address? • NAT • NAC • VLAN • PAT
  • 46. Which of the following is true concerning WEP security? • WEP keys are transmitted in plain text. • The WEP key initialization process is flawed. • The pre-shared WEP keys can be cracked with rainbow tables. • WEP uses the weak RC4 cipher.
  • 47. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? • Vulnerability scanner • Honeynet • Protocol analyzer • Port scanner
  • 48. The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an example of which of the following? • A site survey • Antenna placement • War dialing • War driving
  • 49. Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements will enable Matt to meet this objective? • DMZ • VLAN • VPN • NAT
  • 50. Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? • Interference • Man-in-the-middle • Evil twin • Rogue access point
  • 51. Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? • WPA2 ENT AES • WPA2 PSK AES • WPA2 ENT TKIP • WPA2 PSK TKIP