Shared Flashcard Set

Details

SY-401
CompTIA Security Plus Certification
19
Computer Science
Not Applicable
06/29/2015

Additional Computer Science Flashcards

 


 

Cards

Term

The BEST methods for a web developer to prevent the website application code from being vulnerable to cross-site request forgery (XSRF) are to:

Definition

1.

validate and filter input on the server side and client side

 

2.

restrict and sanitize use of special characters in input and URLs

 

Term

Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication.Which of the following is an authentication method Jane should use?

Definition
LEAP
Term

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.Which of the following BEST describes this exploit?

Definition
Zero-day
Term

A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

Definition
IPsec
Term
Which of the following implementation steps would be appropriate for a public wireless hot-spot?
Definition
Open system authentication
Term
Which of the following is a step in deploying a WPA2-Enterprise wireless network?
Definition
Install a digital certificate on the authentication server
Term

Which of the following controls would allow a company to reduce the exposure of sensitive systems from unmanaged devices on internal networks?

Definition
802.1x
Term

Which of the following preventative controls would be appropriate for responding to a directive to

reduce the attack surface of a specific host?

 

Definition
Disabling unnecessary services
Term

A security manager must remain aware of the security posture of each system. Which of the following supports this requirement?

Definition
Establishing baseline reporting
Term
Deploying a wildcard certificate is one strategy to:
Definition
Reduce the certificate management burden.
Term

The security administrator needs to manage traffic on a layer 3 device to support FTP from a new

remote site. Which of the following would need to be implemented?

 

Definition
Access control lists
Term
Which of the following ports is used for SSH, by default?
Definition
22
Term

A network administrator has been tasked with securing the WLAN. Which of the following cryptographic products would be used to provide the MOST secure environment for the WLAN?

Definition
WPA2 CCMP
Term

A server with the IP address of 10.10.2.4 has been having intermittent connection issues. The logs

show repeated connection attempts from the following IPs:

10.10.3.16

 

10.10.3.23

 

212.178.24.26

 

217.24.94.83

 

These attempts are overloading the server to the point that it cannot respond to traffic. Which of the following attacks is occurring?

Definition
DDoS
Term
Which of the following ciphers would be BEST used to encrypt streaming video?
Definition
RC4
Term

A user attempting to log on to a workstation for the first time is prompted for the following information before being granted access: username, password, and a four-digit security pin that was mailed to him during account registration. This is an example of which of the following?

Definition
Single factor authentication
Term

After analyzing and correlating activity from multiple sensors, the security administrator has determined that a group of very well organized individuals from an enemy country is responsible for various attempts to breach the company network, through the use of very sophisticated and targeted attacks. Which of the following is this an example of?

Definition
Advanced persistent threat
Supporting users have an ad free experience!