CompTIA Security+ practice questions
The system administrator
The owner of the resource
The system administrator and the owner of the resource
The user requiring access to the resource
To find rogue access points
To allow wireless usage
To mitigate data emanation
To minimize weak encryption
A challenge-response session is a workstation or system that produces a random challenge string that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).
A challenge-response session is a workstation or system that produces a random login ID that the user provides, when prompted, in conjunction with the proper PIN (Personal Identification Number).
A challenge-response session is a special hardware device used to produce random text in a cryptography system.
A challenge-response session is the authentication mechanism in the workstation or system that does not determine whether the owner should be authenticated
NTLMv2
LANMAN
NTLM
VLAN
Clocks are used to ensure proper connections.
Clocks are used to ensure that tickets expire correctly.
Clocks are used to generate the seed value for the encryptions keys
Clocks are used to both benchmark and specify the optimal encryption algorithm
Application log
Performance baseline
Systems monitor
Security log
Use packet sniffing software on all inbound communications
Apply the most recent manufacturer updates and patches to the server.
Enable auditing on the web server and periodically review the audit logs
Block all Domain Name Service (DNS) requests coming into the server
Birthday
Buffer overflow
Spam
Brute Force
Communications are a drain on bandwidth
Communications are open and unprotected
Has no common protocol
Uses weak encryption
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.