Deck 7: Administering a Secure Network

Full screen (f)
exit full mode
Question
S/MIME can be used when mail is accessed through a web browser.
Use Space or
up arrow
down arrow
to flip the card.
Question
File integrity check (FIC)is a service that can monitor any changes made to computer files,such as operating system files.
Question
SNMP-managed devices must have an agent or a service that listens for commands and then executes them.
Question
A correlation engine aggregates and correlates content from different sources to uncover an attack.
Question
The most popular implementation of DNS is the Unix Internet Name Domain.
Question
At what level of the OSI model does the IP protocol function?

A)Transport Layer
B)Network Layer
C)Data link Layer
D)Presentation Layer
Question
Trivial File Transfer Protocol (TFTP)uses a more memory when compared to FTP.
Question
An administrator needs to examine FTP commands that are being passed to a server.What port should the administrator be monitoring?

A)19
B)20
C)21
D)22
Question
Which layer of the OSI model contains the TCP protocol,which is used for establishing connections and reliable data transport between devices?

A)Application Layer
B)Presentation Layer
C)Network Layer
D)Transport Layer
Question
How can a network of physical devices be grouped into logical units,regardless of what network switches they may be connected to?

A)VLAN
B)subnets
C)IP address
D)MAC address
Question
TCP/IP uses its own four-layer architecture that includes the Network Interface,Internet,Transport,and Application layers.
Question
A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS)attacks.
Question
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

A)WINS
B)NIS
C)TACACS+
D)DNS
Question
What protocol suite below is the most commonly used protocol for local area network (LAN)communication?

A)UDP
B)IPX/SPX
C)TCP/IP
D)Appletalk
Question
When using SNMPv1 or SNMPv2,what piece of information is needed to view information from an agent?

A)entity
B)community string
C)MIB
D)OID
Question
DNS poisoning can be prevented using the latest edition of what software below?

A)BIND
B)DHCP
C)WINS
D)finger
Question
When setting up a server virtualization environment,what component below manages the virtual machine operating systems and supports one or more guest systems?

A)kernel
B)supervisor
C)hypercard
D)hypervisor
Question
A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
Question
What device operates at the Network Layer (layer 3)of the OSI model and forwards packets across computer networks?

A)bridge
B)router
C)switch
D)hub
Question
Type I hypervisors run on the host operating system.
Question
Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?

A)PaaS
B)SDN
C)VDI
D)SaaS
Question
What hardware device can be inserted into a network to allow an administrator to monitor traffic?

A)network tap
B)network mirror
C)shark box
D)shark tap
Question
Select the email protocols that are not secure? (Choose all that apply. )

A)TLS
B)S/MIME
C)POP
D)IMAP
Question
What secure protocol is recommended for voice and video?

A)SRTP
B)S/MIME
C)IMAP
D)IPsec
Question
What specific issues are associated with log management? (Choose all that apply. )

A)The multiple devices generating logs.
B)The different log formats.
C)The fast network transfer speeds.
D)The large volume of data that needs to be logged
Question
Which of the following protocols is unsecured?

A)HTTPS
B)TLS
C)SSL
D)FTP
Question
What secure protocol is recommended for time synchronization?

A)SRTP
B)S/MIME
C)NTP
D)POP
Question
What type of computing environment allows servers,storage,and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?

A)virtual services
B)hosted services
C)cloud services
D)volume computing
Question
On and SDN network,what specific unit gives traffic the permission to flow through the network?

A)SDN router
B)SDN firewall
C)SDN gateway
D)SDN controller
Question
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch,what switch technology will need to be supported?

A)interface capture
B)port identity
C)port snooping
D)port mirroring
Question
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply. )

A)data plane
B)management plane
C)control plane
D)data plane
Question
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?

A)SSL/TLS tap
B)SSL/TLS accelerator
C)SSL/TLS access point
D)SSL/TLS mirror
Question
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

A)TCP/IP
B)FTP
C)SNMP
D)SRTP
Question
What secure protocol is recommended for Network address translation?

A)SRTP
B)S/MIME
C)IMAP
D)IPsec
Question
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?

A)IaaS
B)cloud computing
C)virtualization
D)PaaS
Question
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

A)malware management
B)inventory permissions
C)application whitelist
D)application control
Question
What type of switch is used to combine multiple network connections into a single link?

A)core switch
B)gateway switch
C)aggregation switch
D)access switch
Question
In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?

A)Application as a Service
B)Infrastructure as a Service
C)Software as a Service
D)System as a Service
Question
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

A)centralized device log analyzer
B)core device log analyzer
C)network log device
D)system log manager
Question
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?

A)Application as a Service
B)Infrastructure as a Service
C)Software as a Service
D)System as a Service
Question
What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?
Question
List the steps of a DNS lookup.
Question
What are the two types of community strings?
Question
Discuss the Infrastructure as a Service (IaaS)model used in cloud computing.
Question
Why is the Physical Layer omitted in the TCP/IP model?
Question
Discuss the Software as a Service (SaaS)model used in cloud computing.
Question
Discuss at least two security advantages of a host running virtualization.
Question
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Question
Explain the basic operating principals used in software defined networking.
Question
Describe the ways you can use FTP on a local host computer.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Administering a Secure Network
1
S/MIME can be used when mail is accessed through a web browser.
False
2
File integrity check (FIC)is a service that can monitor any changes made to computer files,such as operating system files.
True
3
SNMP-managed devices must have an agent or a service that listens for commands and then executes them.
True
4
A correlation engine aggregates and correlates content from different sources to uncover an attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The most popular implementation of DNS is the Unix Internet Name Domain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
At what level of the OSI model does the IP protocol function?

A)Transport Layer
B)Network Layer
C)Data link Layer
D)Presentation Layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Trivial File Transfer Protocol (TFTP)uses a more memory when compared to FTP.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
An administrator needs to examine FTP commands that are being passed to a server.What port should the administrator be monitoring?

A)19
B)20
C)21
D)22
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which layer of the OSI model contains the TCP protocol,which is used for establishing connections and reliable data transport between devices?

A)Application Layer
B)Presentation Layer
C)Network Layer
D)Transport Layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
How can a network of physical devices be grouped into logical units,regardless of what network switches they may be connected to?

A)VLAN
B)subnets
C)IP address
D)MAC address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
TCP/IP uses its own four-layer architecture that includes the Network Interface,Internet,Transport,and Application layers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS)attacks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

A)WINS
B)NIS
C)TACACS+
D)DNS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What protocol suite below is the most commonly used protocol for local area network (LAN)communication?

A)UDP
B)IPX/SPX
C)TCP/IP
D)Appletalk
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
When using SNMPv1 or SNMPv2,what piece of information is needed to view information from an agent?

A)entity
B)community string
C)MIB
D)OID
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
DNS poisoning can be prevented using the latest edition of what software below?

A)BIND
B)DHCP
C)WINS
D)finger
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When setting up a server virtualization environment,what component below manages the virtual machine operating systems and supports one or more guest systems?

A)kernel
B)supervisor
C)hypercard
D)hypervisor
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What device operates at the Network Layer (layer 3)of the OSI model and forwards packets across computer networks?

A)bridge
B)router
C)switch
D)hub
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Type I hypervisors run on the host operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?

A)PaaS
B)SDN
C)VDI
D)SaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What hardware device can be inserted into a network to allow an administrator to monitor traffic?

A)network tap
B)network mirror
C)shark box
D)shark tap
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Select the email protocols that are not secure? (Choose all that apply. )

A)TLS
B)S/MIME
C)POP
D)IMAP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
What secure protocol is recommended for voice and video?

A)SRTP
B)S/MIME
C)IMAP
D)IPsec
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What specific issues are associated with log management? (Choose all that apply. )

A)The multiple devices generating logs.
B)The different log formats.
C)The fast network transfer speeds.
D)The large volume of data that needs to be logged
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following protocols is unsecured?

A)HTTPS
B)TLS
C)SSL
D)FTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What secure protocol is recommended for time synchronization?

A)SRTP
B)S/MIME
C)NTP
D)POP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What type of computing environment allows servers,storage,and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?

A)virtual services
B)hosted services
C)cloud services
D)volume computing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
On and SDN network,what specific unit gives traffic the permission to flow through the network?

A)SDN router
B)SDN firewall
C)SDN gateway
D)SDN controller
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch,what switch technology will need to be supported?

A)interface capture
B)port identity
C)port snooping
D)port mirroring
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply. )

A)data plane
B)management plane
C)control plane
D)data plane
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?

A)SSL/TLS tap
B)SSL/TLS accelerator
C)SSL/TLS access point
D)SSL/TLS mirror
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

A)TCP/IP
B)FTP
C)SNMP
D)SRTP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
What secure protocol is recommended for Network address translation?

A)SRTP
B)S/MIME
C)IMAP
D)IPsec
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?

A)IaaS
B)cloud computing
C)virtualization
D)PaaS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

A)malware management
B)inventory permissions
C)application whitelist
D)application control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What type of switch is used to combine multiple network connections into a single link?

A)core switch
B)gateway switch
C)aggregation switch
D)access switch
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?

A)Application as a Service
B)Infrastructure as a Service
C)Software as a Service
D)System as a Service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

A)centralized device log analyzer
B)core device log analyzer
C)network log device
D)system log manager
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?

A)Application as a Service
B)Infrastructure as a Service
C)Software as a Service
D)System as a Service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List the steps of a DNS lookup.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the two types of community strings?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the Infrastructure as a Service (IaaS)model used in cloud computing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Why is the Physical Layer omitted in the TCP/IP model?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss the Software as a Service (SaaS)model used in cloud computing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss at least two security advantages of a host running virtualization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain the basic operating principals used in software defined networking.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe the ways you can use FTP on a local host computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.