Sec+ Study Guide B focuses on enhancing cybersecurity skills, covering secure virtualization, access controls, patch management, and encryption. It prepares technicians for Security+ certification, emphasizing practical security measures and infrastructure protection.
Enforce Kerberos
Deploy smart cards
Time of day restrictions
Access control lists
Rate this question:
Download the patch from the vendors secure website and install it on the most vulnerable workstation
Download the patch from the vendors secure website, test the patch and install it on all workstations.
Download the patch from the vendors secure website and install it as needed
Download the patch from the Internet, test the patch and install it on all of the productionservers.WBerlin
Rate this question:
AES
DES
SHA
RSA
Rate this question:
Quantum
Elliptical curve
Asymmetric
Symmetric
Rate this question:
Driving from point to point with a laptop and an antenna to find unsecured wireless access points.
Driving from point to point with a wireless scanner to read other users emails through the access point.
Driving from point to point with a wireless network card and hacking into unsecured wireless access points.
Driving from point to point with a wireless scanner to use unsecured access points
Rate this question:
Blocks everything and only allows privileges based on job description
Blocks everything and only allows explicitly granted permissions
Blocks everything and only allows the minimal required privileges
Blocks everything and allows the maximum level of permissions
Rate this question:
At least once a week as part of system maintenance
As the definitions become available from the vendor
When a new virus is discovered on the system
When an attack occurs on the network
Rate this question:
To look for weak passwords on the network
To changea users passwords when they leave the company
To enforce password complexity requirements
To change users passwords if they have forgotten them
Rate this question:
Configure a rule in eachusers router and restart the router.
Configure rules on the users host and restart the host.
Install an anti-spam filter on the domain mail servers and filter the email address.
Install an ACL on the firewall to block traffic from the sender and filter the IP address.
Rate this question:
A NIDS monitors and analyzes network traffic for possible intrusions
A NIDS is installed on the proxy server
A NIDS prevents certain types of traffic from entering a network.
A NIDS is normally installed on the email server.
Rate this question:
Install HIDS to determine the CPU usage
Run performance monitor to evaluate the CPU usage
Install malware scanning software
Use a protocol analyzer to find the cause of the traffic
Rate this question:
One-way
Encrypts a connection
Ensures data can be easily decrypted
Fixed length output
Requires a key
Rate this question:
SSH
Telnet
Rlogin
HTTP
Rate this question:
Phishing
Insider theft
Dumpster diving
Shoulder surfing
Rate this question:
Mantrap
DMZ
Turnstile
Anti-pass back
Rate this question:
Port scanner
Protocol analyzer
Firewall
Password cracker
Rate this question:
Ticket Granting System
Certificate Authority
Internet Key Exchange
Key Distribution Center
Rate this question:
Vulnerability assessment
Imaging software
Patch management
Configuration baseline
Rate this question:
Security template
Buffer overflow protection
NIPS
Input validation
Rate this question:
VMOS
VCPU
Hypervisor
Virtual supervisor
Rate this question:
ARP Poisoning
DoS
TCP/IP Hijacking
Man-in-the-middle
Rate this question:
Internet content filter
Firewall
ACL
Caching server
Rate this question:
Provides additional resources for testing
Provides real-time access to all system processes
Provides a read-only area for executing code
Provides a restricted environment for executing code
Rate this question:
Session hijacking
Least privilege
Privilege escalation
Network address translation
Rate this question:
Disable the USB root hub within the OS.
Install anti-virus software on the USB drives
Disable USB within the workstations BIOS.
Apply the concept of least privilege to USB devices
Run spyware detection against all workstations
Rate this question:
Take screen shots of the configuration options
Create an image from the OS install.
Create a boot disk for the operating system
Implement OS hardening procedures
Rate this question:
Instant messagetraffiC.
SPIM
S/MIME.
Spam.
Rate this question:
Utilize SSL on the website
Implement an ACL
Lock-down the database
Input validation
Rate this question:
HIDS
A VLAN
A network router
An access list
Rate this question:
DNS poisoning
DoS
DNS caching
Smurf attack
Rate this question:
IPv6
IPSec
DMZ
VLAN
Rate this question:
IPSec
NAT
SSH
SFTP
Rate this question:
Hub
IDS
Switch
Firewall
Rate this question:
Translate addresses at the perimeter
To provide a decoy target on the network
Provide cryptography for the network
Work as a network proxy
Rate this question:
Carbon Dioxide
Hydrogen Peroxide
Wet pipe sprinkler
Deluge sprinkler
Rate this question:
Public Key Infrastructure (PKI)
Expired or revoked certificates
Certificate authorities
Expired user accounts
Rate this question:
LANMAN validation
Encrypt data
Kerberos authentication
Issue private/public keys
Rate this question:
SMTP
SNMP
SFTP
SSH
Rate this question:
SMTP
S/MIME
ISAKMP
IPSec
Rate this question:
TPM
OVAL
SNMP
ISAKMP
Rate this question:
SSL
SHA-1
Blowfish
3DES
Rate this question:
Performance
A pre-shared key
Kiting
Confidentiality
Rate this question:
ECC
Rijndael.
3DES.
RC4
Rate this question:
It is the algorithm used in PGP
It is implemented in portable devices
It is a private key algorithm.
It is CPUintensivE.
Rate this question:
Session keys are sent unencrypted
Session keys are encrypted using an asymmetric algorithm.
Session keys are sent in clear text because they are private keys
Session keys are encrypted using a symmetric algorithm
Rate this question:
Implement single sign-on.
Implement shared passwords.
Implement account-lockout thresholds.
Implement shadow passwords.
Implement stronger password complexity policies.
Rate this question:
Performing aGutman sanitization of the drive
Performing a binary copy of the systems storage media
Performing a file level copy of the systems storage media
Performing a sanitization of the drive
Rate this question:
Conduct periodic penetration testing assessments.
Conduct periodic personnel employment verifications
Conduct rights review of users and groups
Conduct virus scan.
Conduct vulnerability assessments.
Rate this question:
Quiz Review Timeline (Updated): Feb 28, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.