Shared Flashcard Set

Details

CompTIA Security+
CompTIA Security+ (2008 Edition) Exam Version 39.0
8
Computer Science
Professional
11/25/2010

Additional Computer Science Flashcards

 


 

Cards

Term
A security administrator wants to implement a more secure way to login to a VPN in addition to a username and password. Which of the following is the MOST secure way to log in to a VPN?
A. Implementing an ACL
B. Setting up a PKI


C. Implementing a single sign on process
D. Setting up two VPNs
Definition
Term

 

Which of the following audit types would a security administrator perform on the network to ensure each workstation is standardized?

A. Group policy

B. Domain wide password policy

C. Storage and retention policy

D. User access and rights

 

Definition
A.
Term
Which of the following standards encodes in 64-bit sections, 56 of which are the encryption key?

A. SHA
B. AES
C. DES
D. Blowfish
Definition
C. DES encrypts and decrypts data in 64-bit blocks, using a 64-bit key, although the effective key strength is only 56 bits. The least significant (right-most) bit in each byte is a parity bit, and should be set so that there are always an odd number of 1s in every byte. These parity bits are ignored, so only the seven most significant bits of each byte are used, resulting in a key length of 56 bits.
Term
Why is an ad-hoc network a security risk?

A. An ad-hoc network allows access to another computer at the same level of the logged in user, compromising information.

B. An ad-hoc network allows access to the nearest access point which may allow a direct connection to another computer.

C. An ad-hoc network allows access to the nearest access point which may give elevated rights to the connecting user.
Definition
A.
Term
Which of the following is used to both deploy and reapply baseline security configurations?

A. Performance baseline
B. Security agent
C. Security template
D. Configuration baseline
Definition
C.
Term
Which of the following is BEST suited to detect local operating system compromises?
A. Personal firewall
B. HIDS
C. Anti-spam
D. System log
Definition
B.
Term
Which of the following is a benefit of network access control (NAC)?

A. A user is able to distribute connections to the network for load balancing using a centralized list of approved devices.
B. A user is able to distribute connections to the network using cached credentials on a local machine.
C. A user is able to control connections to the network using a centralized list of approved devices.
D. A user is able to control connections to the network using cached credentials on a local
Definition
C. A user is able to control connections to the network using a centralized list of approved devices.
Supporting users have an ad free experience!