Deck 7: Administering a Secure Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 7: Administering a Secure Network
1
A ____ forwards packets across computer networks.
A) bridge
B) router
C) switch
D) hub
A) bridge
B) router
C) switch
D) hub
B
2
The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
A) UDP
B) ASN.1
C) TCP/IP
D) BER
A) UDP
B) ASN.1
C) TCP/IP
D) BER
C
3
____ can be used to determine whether new IP addresses are attempting to probe the network.
A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
A) DNS logs
B) Firewall logs
C) DHCP logs
D) Proxy logs
B
4
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.
A) entity
B) community string
C) MIB
D) OID
A) entity
B) community string
C) MIB
D) OID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
It is possible to segment a network by physical devices grouped into logical units through a(n) ____.
A) VLAN
B) subnets
C) IP address
D) MAC address
A) VLAN
B) subnets
C) IP address
D) MAC address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ can create entries in a log for all queries that are received.
A) network log
B) DHCP log
C) DNS log
D) proxy log
A) network log
B) DHCP log
C) DNS log
D) proxy log
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
IEEE 802.1x is commonly used on wireless networks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
IP telephony and Voice over IP (VoIP) are identical.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is used to relay query messages.
A) ICMP
B) FTP
C) UDP
D) TCP
A) ICMP
B) FTP
C) UDP
D) TCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Routers operate at the ____ Layer.
A) Transport
B) Application
C) Presentation
D) Network
A) Transport
B) Application
C) Presentation
D) Network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.
A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ is a database, organized as a hierarchy or tree, of the name of each site on the Internet and its corresponding IP number.
A) WINS
B) NIS
C) TACACS+
D) DNS
A) WINS
B) NIS
C) TACACS+
D) DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Broadcast storms can be prevented with ____.
A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
A) spanning tree
B) Dijkstra's algorithm
C) 802.11x
D) loop protection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
TCP is the main ____ protocol that is responsible for establishing connections and the reliable data transport between devices.
A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
TCP port ____ is the FTP control port used for passing FTP commands.
A) 19
B) 20
C) 21
D) 22
A) 19
B) 20
C) 21
D) 22
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
A) flood guard
B) protocol guard
C) link guard
D) frame guard
A) flood guard
B) protocol guard
C) link guard
D) frame guard
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.
A) BIND
B) DHCP
C) WINS
D) finger
A) BIND
B) DHCP
C) WINS
D) finger
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
In the ____ cloud computing model, the customer has the highest level of control.
A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
____ is a pay-per-use computing model in which customers pay only for the computing resources they need.
A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
A) Cloud computing
B) Virtualization
C) Cloud Software as a Service
D) Infrastructure as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.
A) kernel
B) supervisor
C) hypercard
D) hypervisor
A) kernel
B) supervisor
C) hypercard
D) hypervisor
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
List and describe the three fields that each ICMP message contains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Describe one way to use FTP on a local host computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.
A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
A) Cloud Application as a Service
B) Cloud Infrastructure as a Service
C) Cloud Software as a Service
D) Cloud System as a Service
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Why is the Physical Layer omitted in the TCP/IP model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss one security advantage to hosts running virtualization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the two types of community strings?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.
A) Portability
B) Virtualization
C) Availability
D) Migration assistance
A) Portability
B) Virtualization
C) Availability
D) Migration assistance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ provides a greater degree of security by implementing port-based authentication.
A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
A) IEEE 802.3ad
B) IEEE 802.11n
C) IEEE 802.1x
D) IEEE 802.1z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The ____________________ Layer is omitted in the TCP/IP model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
List the steps of a DNS lookup.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ servers are intermediate hosts through which Web sites are accessed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List the steps in an 802.1x authentication procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ____________________ is a record of events that occur.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
List and describe the three service models of cloud computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List and describe three benefits offered by IP telephony.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck