Your SlideShare is downloading. ×
0
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

CompTIA Security+ Chapter Four Review

1,580

Published on

This is a ppt I created to inspire my students to competively answer and relearn for the test on Chapter Four: Securing your Network in the CompTIA Security+ Get Certified Get Ahead SY0-301 Study …

This is a ppt I created to inspire my students to competively answer and relearn for the test on Chapter Four: Securing your Network in the CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,580
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
28
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Chapter 4 Review McKinley Technology High School – Ms. Wiscount
  • 2. What can an administrator use to detect malicious activity after it occurred? • Firewall • Sniffer • Port scanner • IDS
  • 3. Of the following choices, what would detect compromises on a local server? • HIDS • NIPS • Firewall • Protocol Analyzer
  • 4. Of the following choices, what represents the best choice for a system to detect attacks on a network, but not block them? • NIDS • NIPS • HIDS • HIPS
  • 5. Your organization is using a NIDS. The NIDS vendor regularly provides updates for the NIDS to detect known attacks. What type of NIDS is this? • Anomaly-based • Signature-based • Prevention-based • Honey-based
  • 6. You are preparing to deploy an anomaly-based detection system to monitor network activity. What would you create first? • Flood guards • Signatures • Baseline • Honeypot
  • 7. Of the following choices, what can you use to divert malicious attacks on your networks away from valuable resources to relatively worthless resources? • IDS • Proxy server • Web application firewall • Honeypot
  • 8. Of the following choices, what best describes the function of an IPS? • Detect attacks • Stop attacks in progress • Prevent attackers from attacking • Notify appropriate personnel of attacks
  • 9. Of the following choices, what provides active protection for an operating system? • NIDS • NIPS • HIDS • HIPS
  • 10. Of the following choices, what most accurately describes a NIPS? • Detects and takes action against threats • Provides notification of threats • Detects and eliminates threats • Identifies zero day vulnerabilities
  • 11. You’ve recently completed a wireless audit and realize that the wireless signal from your company’s WAP reaches the parking lot. What can you do to ensures that the signal doesn’t reach outside your building? • Increase the WAP’s power level • Decrease the WAP’s power level • Enable SSID broadcasting • Disable SSID broadcasting
  • 12. Which of the following secure protocols did WEP implement incorrectly, allowing attackers to crack it? • SSL • RC4 • CCMP • AES
  • 13. Your organization is designing an 802.11n network and wants to use the strongest security. What would you recommend? • FTPS • SSL • WEP • WPA2
  • 14. Which of the following authentication mechanisms can provide centralized authentication for a wireless network? • WPA2 • RADIUS • Multifactor authentication • Kerberos
  • 15. You want to ensure that only specific wireless clients can access your wireless networks. Of the following choices, what provides the best solution? • MAC filtering • Content filtering • NAT • NIPS
  • 16. You recently completed a wireless audit of your company’s wireless network. You’ve identified several unknown devices connected to the network and realize they are devices owned by company employees. What can you use to prevent these devices from connecting? • MAC filtering • Enable SSID broadcast • Enable isolation mode on the WAP • Reduce the power levels on the WAP
  • 17. What can you do to prevent the easy discovery of a WAP? • Enable MAC filtering • Disable SSID broadcast • Enable SSID broadcast • Enable 802.1X authentication
  • 18. What troubleshooting a problem with a WAP in your organization, you discover a rogue access point with the same SSID as the organization’s WAP. What is the second access point? • IDS • War chalking • Evil twin • Packet sniffer
  • 19. You want to identify the physical location of a rogue access point you discovered in the footprint of your company. What would you use? • Bluesnarfing • Bluejacking • War chalking • War driving
  • 20. You are hosting a wireless hotspot, and you want to segment wireless users from each other. What should you use? • Personal mode • Enterprise mode • Isolation mode • WEP
  • 21. Which of the following best describes bluejacking? • Bluejacking involves accessing data on a phone • Bluejacking involves checking a WAP’s antenna placement, power levels and encryption techniques • Bluejacking involves sending unsolicited messages to a phone • Bluejacking involves a rogue access point with the same SSID as your production WAP
  • 22. Someone stole an executive’s smartphone, and the phone includes sensitive data. What should you do to prevent the thief from reading the data? • Password protect the phone • Encrypt the data on the phone • Use remote wipe • Track the location of the phone
  • 23. You are deploying a remote access server for your organization. Employees will use this to access the network while on the road. Of the following choices, what must you configure? • NAC • ACLs • MACs • NAT-T
  • 24. Your organization is creating a site-to-site VPN tunnel between the main business location and a remote office. What can it use to create the tunnel? • WAP2-Enterprise • RADIUS • NAC • IPsec
  • 25. You are planning to deploy a VPN with IPsec. Users will use the VPN to access corporate resources while they are on the road. How should you use IPsec? • With AH in tunnel mode • With AH in transport mode • With ESP in tunnel mode • With ESP in transport mode
  • 26. An employee connect to the corporate network using a VPN. However, the client is not able to access internal resources, but instead receives a warning indicating their system is not up to date with current patches. What is causing the behavior? • The VPN is using IPsec • The VPN is not using IPsec • NAC is disabled on the network and remediation must take place before the client can access internal resources • NAC is enabled on the network and remdeiation must take place before the client can access internal resources
  • 27. In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). • Subnetting • NAT • Firewall • NAC • VPN
  • 28. Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? • 802.1X • DHCP • 802.1q • NIPS
  • 29. A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as which of the following? • Whaling • Bluesnarfing • Vishing • Dumpster diving
  • 30. Which of the following specifications would Sara, an administrator, implement as a network access control? • 802.1q • 802.3 • . 802.11n • 802.1x
  • 31. Configuring the mode, encryption methods, and security associations are part of which of the following? • IPSec • Full disk encryption • 802.1x • PKI
  • 32. Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks? • Fuzzer • IDS • Proxy • Honeypot
  • 33. Which of the following provides the HIGHEST level of confidentiality on a wireless network? • Disabling SSID broadcast • MAC filtering • WPA2 • Packet switching
  • 34. Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection? • HIPS • Antivirus • NIDS • ACL
  • 35. Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? • HIDS • Firewall • NIPS • Spam filter
  • 36. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? • War dialing • War chalking • War driving • Bluesnarfing
  • 37. Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? • HIPS • NIDS • HIDS • NIPS
  • 38. Which of the following devices can Sara, an administrator, implement to detect and stop known attacks? • Signature-based NIDS • Anomaly-based NIDS • Signature-based NIPS • Anomaly-based NIPS
  • 39. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? • EAP-TLS • PEAP • WEP • WPA
  • 40. Which of the following are used to implement VPNs? (Select TWO). • SFTP • IPSec • HTTPS • SNMP • SSL
  • 41. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? • Man-in-the-middle • Bluejacking • Bluesnarfing • Packet sniffing
  • 42. Which of the following protocols can be used to secure traffic for telecommuters? • WPA • IPSec • ICMP • SMTP
  • 43. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? • Implement WPA • Disable SSID • Adjust antenna placement • Implement WEP
  • 44. Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO). • SFTP • IPSec • SSH • HTTPS • ICMP
  • 45. Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address? • NAT • NAC • VLAN • PAT
  • 46. Which of the following is true concerning WEP security? • WEP keys are transmitted in plain text. • The WEP key initialization process is flawed. • The pre-shared WEP keys can be cracked with rainbow tables. • WEP uses the weak RC4 cipher.
  • 47. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? • Vulnerability scanner • Honeynet • Protocol analyzer • Port scanner
  • 48. The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an example of which of the following? • A site survey • Antenna placement • War dialing • War driving
  • 49. Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements will enable Matt to meet this objective? • DMZ • VLAN • VPN • NAT
  • 50. Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? • Interference • Man-in-the-middle • Evil twin • Rogue access point
  • 51. Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? • WPA2 ENT AES • WPA2 PSK AES • WPA2 ENT TKIP • WPA2 PSK TKIP

×