• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back

Source Sites:


- http://www.examcompass.com/comptia-security-plus-practice-test-1-exam-sy0-401


- http://www.proprofs.com/mwiki/index.php/Comptia_Security%2B_Certification_Exam


- http://vue.com/comptia/

Source info

A software or hardware that checks information coming from the Internet and depending on the applied configuration settings either blocks it or allows it to pass through is called:



A. Antivirus


B. Firewall


C. Antispyware


D. Malware

B. Firewall

A device designed to forward data packets between networks is called:



A. Switch


B. Hub


C. Router


D. MAC filter

C. Router

Allowing a program through a firewall is known as creating:



A. Tunnel


B. Entry


C. Access Point (AP)


D. Exception

D. Exception

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called:



A. Load balancer


B. HIDS


C. Firewall


D. Captive portal

A. Load balancer

The last default rule on a firewall is to:



A. Create an exception


B. Allow all traffic


C. Deny all traffic


D. Unblock all ports

C.

A computer network service that allows clients to make indirect network connections to other network services is called:



A. Load balancer


B. Proxy


C. Network Access Control (NAC)


D. Backdoor

B. Proxy

A solution designed for filtering malicious / restricted content from entering corporate networks is known as:



A. MAC filter


B. Subnetting


C. HIPS


D. Web security gateway

D. Web security gateway

Which of the following answers refers to a dedicated device for managing secure connections established over an untrusted network, such as the Internet?



A. Load balancer


B. VPN concentrator


C. Spam filter


D. Web server

B. VPN concentrator

Which of the following answers list the protocol and port number used by a spam filter? (Select 2 answers)



A. HTTPS


B. 23


C. SMTP


D. 443


E. TELNET


F. 25

C. SMTP


F. 25

Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?



A. MTU


B. STP


C. UTM


D. XML

A. MTU

URL filtering restricts access to Internet sites based on which of the following criteria?



a. Virus signature


b. Web address


c. Baseline


d. Data content

b. Web address

Which of the following acronyms refers to a firewall controlling access to a web server?



a. WPS


b. WEP


c. MTBF


d. WAF

b. WAF

Which of the following answers refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?



a. CRL


b. NAT


c. BCP


d. ACL

d. ACL

Which of the following actions can be taken by passive IDS? (Select 2 answers)



a. Reconfiguring firewall


b. Closing down connection


c. Logging


d. Terminating process


e. Sending an alert

c. Logging


e. Sending an alert

802.1x is an IEEE standard defining:



a. Token ring networks


b. Port-based network access control


c. VLAN tagging


d. Wireless networking

b. Port-based network access control

An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:



a. Mandatory Access Control


b. Lattice-Based Access Control


c. Role-Based Access Control


d. Rule-Based Access Control

d. Rule-Based Access Control

Interconnection Security Agreement (ISA)

An agreement est. between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection. The ISA also supports a MOU/A between orgs.

Recovery Time Objective (RTO)

The targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.

Recovery Point Objective (RPO)

The age of files that must be recovered from backup storage so that normal operations can resume if a computer, system, or network goes down as a result of hardware, program, or communications failure.

Mean Time to Repair (MTTR)

The average time needed to repair a failed component or device.

Mean Time Between Failure (MTBF)

Predicted elapsed time between failures of a system during operation. Could be calculated as the Arithmetic Mean between Failures.

Annual Rate of Occurrence (ARO)

The probability that a risk will occur within a given year.


For example, if insurance data shows that a serious fire is likely to occur once in 25 years, then the ARO is 1/25 = 0.04%

Annual Loss Expectancy (ALE)

The expected monetary loss that can be expected for an asset due to a risk over a one year period. It is defined as ALE = SLE * ARO

Single Loss Expectancy (SLE)

The monetary loss expected from the occurrence of a risk on an asset. This is a Quantitative Risk.

Omni-directional and Non-directional Antennas

This type of antenna sends a radio signal in every direction. They can cover a spherical area if placed in the center of an office space.

False Negative

Classifying authorized users as impostors

False Positive

Wrongfully classifying a benign instance as a threat. Such as an innocuous file being seen as a malware by anti-malware software.


Classifying an impostor as an authorized user.

True Negative

A negative test result that accurately reflects the tested-for activity of an analyte.

True Positive

A positive test result that accurately reflects the tested-for activity of an analyte.

Inconsistent Timestamps

Each host that generates logs typically references its internal clockwhen setting a timestamp for each log entry. If a host’s clock is inaccurate, the timestamps in itslogs will also be inaccurate. This can make analysis of logs more difficult, particularly when logsfrom multiple hosts are being analyzed. For example, timestamps might indicate that event Ahappened 45 seconds before event B, when event A actually happened two minutes after event B

Redundancy for areas with single points of failure

UPS, secondary locations, backup generator

Archive Bit

denotes if a file has been backup or modified sense last back up.Incremental Backup - Restoring data from an incremental backup requires: All incremental from the last full backup and the last full backup

OVAL

open vulnerabilities assessment language