Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Security Plus 4

COMPTIA Security+ 4

QuestionAnswer
Giving users or groups only the access they need to perform their job is? Principal of Least privilege.
Documenting change levels and revision information is most useful for? Disaster recovery
What is the best IDS to monitor the entire network? Network based IDS
How can Active X controls be configured to prove where they originated from? The Active X controls must be digitally signed.
Performing a security vulnerability assessment scan on systems that a company relies upon, demonstrates what? A commitment to protecting data and customers.
What is the most common goal of operating system logging? To keep a record of system usage.
What type of authentication may be needed when a stored key and memorized password are not strong enough and additional layers of security is needed? Multi-factor
Part of a fire protection plan for a computer room should include what? Procedures for an emergency shutdown of computer equipment.
What is a common DISADVANTAGE of employing an IDS? False positives
What would you do to secure your FTP site? Disable anonymous authentication
Sessions are initiated between a TCP clients and servers. A very small buffer space exist to handle the usual rapid “hand-shaking” exchange of messages that establish the session. What kind of attack exploits this function? SYN Attack
During the digital signature process, hashing provides a means to verify what security requirement? Data integrity
What type of security mechanism can be applied to modems to better authenticate remote users? Call back
What tunneling protocol works only on IP networks? PPTP
Companies without an acceptable use policy may give their employees an expectation of what? Privacy
LDAP directories are arranged as? Trees
What is the first step before a wireless solution is implemented? Perform a thorough site survey
Digital signatures can be used for what? Non-repudiation
Despite regular system backups a significant risk still exists if? Recovery procedures are not tested.
What is a Dictionary Attack? When passwords are configured using simple and meaningful things such as a pet name or birthday.
You have identified some risks to your network. You want to implement policies, procedures and various security measures. What will your objective be? Manage the risks so that the problem resulting from them will be minimized.
SSL operates between which two layers of the OSI model? Application and Transport
How many characters should the minimum length of a password be to deter dictionary password cracks? 8
Is the Private Key part of an X509v3 certificate? No
Created by: uop2001
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards