Part 2 pretest

  1. What is the access control step that verifies that a user is who he or she claims to be?



    B. Authentication
  2. What is the security model that determines whether a user can enter a space and obtain secured objects?



    C. Access Control
  3. A user should be aware of which parts of an organization's security policies?



    D. The security policies applicable to the user and the effects of security breaches.
  4. What is created by a flaw in an application that could be exploited by an external attacker?



    C. Vulnerability
  5. What form of security testing attempts to exploit known or identified vulnerabilities?



    C. Penetration testing
  6. To ensure that data at rest, data in motion, and data in use retain their integrity without unauthorized modification, removal, or corruption, what system should be in place as part of a data security policy?



    A. Data loss prevention
  7. An It technician identifies and removes unnecessary services and a few obsolete user accounts running on a desktop computer. Which of the following is the technician most likely performing.



    A. Host hardening
  8. Which type of authentication system uses a one-time password generated by a mobile device?



    D. Device-generated OTP
  9. What term refers to the delivery of applications as a service in which resources, software, and data are available to the application and a host via the internet?



    C. Cloud computing
  10. What type of encryption uses only a single encryption key to both encrypt and decrypt data?



    D. Symmetric encryption
  11. On which of the following encryption concepts is PKI based?



    A. Symmetric encryption
  12. What is the a DoS attack that send a flood of synchronization (SYN) request and never sends the final acknowledgment (ACK)?



    D. SYN flood
Author
slmckissack
ID
295708
Card Set
Part 2 pretest
Description
Part 2 pretest
Updated