Security Notes 10
Terms in this set (25)
Which of the following answers refers to a privacy-related security risk connected with public sharing of pictures taken with smartphones?
Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices to access privileged company information and applications?
The term Trusted OS refers to an operating system:
With enhanced security features
A file-based representation of the state of a virtual machine at a given time is called:
In computer security, a mechanism for safe execution of untested code or untrusted applications is referred to as:
Which of the following terms refers to a microchip embedded on the motherboard of a personal computer or laptop that can store keys, passwords and digital certificates?
A piece of hardware and associated software / firmware that usually attaches to the inside of a PC or server and provides at least the minimum of cryptographic functions is called:
Which of the following acronyms refers to software or hardware based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?
Which of the following answers refers to a control system providing the capability for real-time monitoring and gathering information related to industrial equipment?
One of the advantages of the Remote Authentication Dial-In User Service (RADIUS) is that it provides encryption for the entire authentication process.
Which of the following answers refers to a Cisco-proprietary alternative to RADIUS?
Assigning a unique key, called a ticket, to each user that logs on to the network is a characteristic feature of:
Which of the following port numbers is used by Kerberos?
What type of encryption protocols are used by Secure LDAP (LDAPS)? (Select all that apply)
Which of the following authentication protocols offer(s) countermeasures against replay attacks? (Select all that apply)
Which of the following answers lists the default port for LDAP server?
An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as:
The non-standard, enhanced version of the LDAP protocol providing the capability for encrypted transmission runs on port:
Which of the following solutions provides a single sign-on capability for Web services?
TACACS+ runs on TCP port:
Which part of the AAA framework deals with verification of the identity of a person or process?
Which of the following examples meets the requirement of multi-factor authentication? (Select best answer)
Password and biometric scan
Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as for example keyboard typing style ("something you do").
A United States Department of Defense (DoD) smart card providing the capability for multi-factor authentication of its personnel is known as:
Multi-factor authentication systems require implementation of authentication factors from two or more different categories.
YOU MIGHT ALSO LIKE...
CompTIA Security+ Certification Practice Test 9&10
CompTIA Security+ Certification Practice Test 7&8 (Exam SY0-401)
CompTIA Security+ Certification Practice Test 3&4 (Exam SY0-401)
OTHER SETS BY THIS CREATOR
Security Notes Malware
Security Notes 12
Security Notes 11
Security Notes 9
THIS SET IS OFTEN IN FOLDERS WITH...
02 Network Security
04 Security+ Wireless Questions
01 Network Security
03 Protocols & Ports