Study sets, textbooks, questions
Upgrade to remove ads
Get Quizlet's official Security+ - 1 term, 1 practice question, 1 full practice test
CompTIA Security+ Sys-501 Exam Studying
Terms in this set (47)
What authentication factor can use an authentication method based on info extracted from a packet header?
Somewhere you are
Various systems in your network environment use consistent settings. You want to be able to check the settings are accurate. What should you do?
Have automated config validation
Which monitoring methodology would be most likely to report false negatives when relying on cumulative data compiled by various trusted security vendors regarding known threats to guard against?
You implemented the use of request verification tokens associated w\ user sessions for a web server. Which type of attack will this help prevent?
Only verifies packet header info
Configuring a load balancer to have a preference in terms of which servers it uses when redistributing network traffic.
Technology that hosts multiple desktop environments on a central server?
What cipher mode is the worst choice in terms of performance?
Handles requests for online content & fetches the relevant info from the internet & presents it internally to the client device.
Processes requests for information on behalf of clients without requiring any intervention or software configuration on the part of the client
Forwards a request for information originating from the Internet to act as an intermediary online servers and internal network servers
Filters requests for data based on configurable criteria such as the originating and destination IP address or port number
Application or Multipurpose
What should you perform, if you need to perform a risk assessment to determine the risk impact on your organization's IT infrastructure?
Uses a NTLM\LanMan of user's password to gain access to system.
Pass the Hash
An attack that is asymmetric where a small number of resources are needed to inflict a significant amount of damage.
An attacker gains access to registration info of a domian.
An attack where attacker relays comms between devices to another device.
What document identifies specific PII that is stored on the servers & to spell out how it's protected, shared & maintained.
Privacy Impact Assessment
Passing traffic from 1 network segment to another based on IP address info associated w\ a port on the switch.
Providing port security by associating a specific MAC address of a particular device w\ a port on the switch
Configuring STP to prevent data loops
Making forwarding decisions based on MAC addresses
What solution will allow users to encrypt individual files?
EFS (encrypting file system)
What is the function of DHE?
provides perfect forward secrecy
Encrypts an XORed IV w/ a key on a data block
CBC - Cipher Block Chaining
A shared value & a key encrypts the data
CTM (CTR) - Counter Mode
Same single key encrypts each block of data.
ECB - Electronic Codebook
Cipher text from the previous block encrypts the next block
CFB - Cipher Feedback
An authentication code used w\ cipher text for verifying data block integrity
GCM - Galois Counter Mode
What components are apart of the incident response plan?
1) Reporting requirements\escalation
2) Roles & Responsibilities
3) Cyber-incident response teams
What role is responsible for processing data backups?
What relies on out-of-band key exchanges to transport keys?
What can be use to service several secure network connections over an unsecure network?
What refers to a TCP port used by FTP for session control?
What port numbers are used by FTP over TLS/SSL (FTPS)?
989 & 990
SFTP, SCP & SSH run on what port by default?
DHCP runs on what port(s)?
UDP port 67 & 68
DNS runs on what port number?
Characteristic features of IMAPS?
SSL, TLS, TCP port 993
What protocols use port 500?
TCP port 389 is the default port for?
What TCP port will need to be open for a secure directory service access w/ an SSL/TLS encryption?
POP3 uses TCP port 110, what port does POP3S use?
TCP port 995
What ports are used by RADIUS?
ports 1812, 1813
RDP (remote desktop protocol) uses what port?
TCP port 3389
What traffic does unblocking port 22 enable?
SSH & SFTP
SMTP uses which TCP port?
Recommended textbook explanations
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
David A. Patterson, John L. Hennessy
Introduction to Algorithms
Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
Python for Everyone
Cay S. Horstmann, Rance D. Necaise
Fundamentals of Database Systems
Other Quizlet sets
MSK vs. NM Conditions
Real Estate Study Guide Part 2
Chapter 16: The Role of Crime Scene Analysis and R…