Comptia a+ (5)

Card Set Information

Author:
ROARKE008
ID:
102233
Filename:
Comptia a+ (5)
Updated:
2011-09-16 22:56:57
Tags:

Folders:

Description:
STUDY! STUDY! STUDY! THE HOMELESS HAVE GIVEN UP, WHAT ARE YOU GOING TO DO?
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user ROARKE008 on FreezingBlue Flashcards. What would you like to do?


  1. WHAT IS PHYSICAL SECURITY?
    PRIMARILY CONCERNED WITH THE LOSS OR THEFT OF PHYSICAL ASSETS INCLUDING FIRE, THEFT, AND ACTS THAT PHYSICALLY DENY A SERVICE OR INFORMATION
  2. WHAT DOES KERBEROS USE TO AUTHENTICATE A PRINCIPAL?
    KEY DISTRIBUTION CENTER(kdc) TO AUTHENTICATE A PRINCIPAL. KDC PROVIDES A CREDENTIAL THAT CAN BE USED BY ALL KERBEROS ENABLED SERVERS AND APPLICATIONS.
  3. WHICH AUTHENTICATION METHOD SENDS A CHALLENGE TO THE CLIENT THAT IS ENCRYPTED AND THEN SENT BACK TO THE SERVER?
    CHALLENGE HANDSHAKE AUTHENTICATION PROTOCOL(CHAP) SENDS A CHALLENGE TO THE ORIGINATING CLIENT. THIS CHALLENGE IS SENT BACK TO THE SERVER, AND THE ENCRYPTION RESULTS ARE COMPARED. IF THE CHALLENGE IS SUCCESSFUL, THE CLIENT IS LOGGED ON.
  4. WHAT TYPE OF AUTHENTICATION METHOD USES MORE THAN ONE AUTHENTICATION PROCESS FOR A LOGON?
    A MULTIFACTOR AUTHENTICATION PROCESS USES TWO OR MORE PROCESSES FOR LOGON. A TWO FACTOR METHOD MIGHT USE SMART CARDS AND BIOMETRICS FOR LOGON
  5. WHAT TYPE OF TECHNOLOGY RELIES ON A PHYSICAL CHARACTERISTIC OF THE USER TO VERIFY IDENTITY?
    BIOMETRIC TECHNOLOGIES RELY ON A PHYSICAL CHARACTERISTIC OF THE USER TO VERIFY IDENTITY. BIOMETRIC DEVICES TYPICALLY USER EITHER A HAND PATTERN OR A RETINAL SCAN TO ACCOMPLISH THIS.
  6. IN WHICH TYPE OF ATTACH DOES SOMEONE TRY TO CON YOUR ORGANIZATION INTO REVEALING ACCOUNT AND PASSWORD INFORMATION?
    SOMEONE TRYING TO CON YOUR ORGANIZATION INTO REVEALING ACCOUNT AND PASSWORD INFORMATION IS LAUNCHING A SOCIAL-ENGINEERING ATTACK.
  7. WHAT TYPE OF MALICIOUS CODE ATTEMPTS TO REPLICATE USING WHATEVER MEANS ARE AVAILABLE?
    A WORM IS A TYPE OF MALICIOUS CODE THAT ATTEMPTS TO REPLICATE USING WHATEVER MEANS ARE AVAILABLE.
  8. WHAT TYPE OF MALWARE ENTERS THE SYSTEM DISGUISED AS A LEGITIMATE PROGRAM?
    A TROJAN HORSE ENTERS WITH A LEGITIMATE PROGRAM TO ACCOMPLISH ITS EVIL DEEDS
  9. WHAT COULD BE ONE CAUSE OF UNUSUAL ACTIVITY ON THE SYSTEM DISK WHEN NO USER IS ACCESSING THE SYSTEM?
    A SYMPTOM OF MANY VIRUSES IS UNUSUAL ACTIVITY ON THE SYSTEM DISK. THIS IS CAUSED BY THE VIRUS SPREADING TO OTHER FILES ON YOU SYSTEM.
  10. WHAT DO PACKET FILTERS PREVENT?
    PACKET FILTERS PREVENT UNAUTHORIZED PACKETS FROM ENTERING OR LEAVING A NETWORK. PACKET FILTERS ARE A TYPE OF FIREWALL THAT BLOCK SPECIFIED PORT TRAFFIC.

What would you like to do?

Home > Flashcards > Print Preview