Exam 10: Security in Network Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
Verified

C

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

B

The Wired Equivalent Privacy standard had what significant disadvantage?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

What is the difference between an Intrusion Detection System and an Intrusion Protection System?

(Essay)
4.8/5
(37)

Describe the TACACS+ AAA protocol, and detail how it differs from RADIUS.

(Essay)
4.9/5
(32)

What are the three components required to manage access control to a network and its resources?

(Essay)
4.7/5
(39)

Which legacy authentication protocol requires mutual authentication?

(Multiple Choice)
4.7/5
(35)

In regards to the use of local authentication, what statement is accurate?

(Multiple Choice)
4.8/5
(31)

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

(True/False)
4.7/5
(31)

Which of the following is an example of proxy server software?

(Multiple Choice)
4.8/5
(35)

If your LAN utilizes a proxy server, and you wish to send an email message from your workstation inside the LAN to a colleague via the Internet, what does this process look like?

(Essay)
4.9/5
(37)

What is multifactor authentication, and what are some examples?

(Essay)
4.8/5
(31)

How does the CCMP help ensure data confidentiality?

(Essay)
4.8/5
(30)

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

(Multiple Choice)
4.9/5
(37)

The Group Policy utility can be opened by typing what name into a Run box?

(Multiple Choice)
4.9/5
(29)

Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.

(True/False)
4.8/5
(29)

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

(Multiple Choice)
4.8/5
(36)

By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

(True/False)
4.9/5
(33)

When utilizing Kerberos, an access granting ticket is the same as a key.

(True/False)
4.8/5
(38)

You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)