Exam 10: Security in Network Design

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

(Multiple Choice)
4.8/5
(46)

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

(Multiple Choice)
4.9/5
(37)

What is the purpose of Unified Threat Management (UTM)?

(Essay)
5.0/5
(35)

User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.

(True/False)
4.9/5
(38)

The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.

(True/False)
4.8/5
(42)

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

(Multiple Choice)
4.8/5
(32)

The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.

(True/False)
4.9/5
(31)

How does the Remote Authentication Dial-In User Service (RADIUS) function?

(Essay)
4.7/5
(36)

The Spanning Tree Protocol operates at the Network layer of the OSI model.

(True/False)
5.0/5
(36)

Which encryption standard was originally utilized with WPA's TKIP?

(Multiple Choice)
4.9/5
(37)

How does a reverse proxy differ from a normal proxy?

(Essay)
4.7/5
(35)

What kind of firewall can block designated types of traffic based on application data contained within packets?

(Multiple Choice)
4.8/5
(35)

What statement regarding role-based access control is accurate?

(Multiple Choice)
4.9/5
(33)

What is a SIEM (Security Information and Event Management) system utilized for?

(Multiple Choice)
4.9/5
(35)

The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.

(True/False)
5.0/5
(36)

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

(Multiple Choice)
4.9/5
(26)

What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?

(Multiple Choice)
4.8/5
(37)

Which adaptation of EAP utilizes EAP

(Multiple Choice)
4.8/5
(34)

What is NOT a variable that an network access control list can filter traffic with?

(Multiple Choice)
4.9/5
(39)

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

(Multiple Choice)
4.8/5
(27)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)