Deck 10: Infrastructure Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Infrastructure Security
1
Preventing physical access to a server by an unauthorized individual is the
A)Responsibility of the CFO of an organization
B)Primary security concern for a system administrator
C)An organization's least important concern
D)Reason we implement firewalls
A)Responsibility of the CFO of an organization
B)Primary security concern for a system administrator
C)An organization's least important concern
D)Reason we implement firewalls
B
2
_____________ is/are computers in a network that host applications and data for everyone to share.
A)Linux boxes
B)Servers
C)Firewalls
D)Cryptography
A)Linux boxes
B)Servers
C)Firewalls
D)Cryptography
B
3
Centralized monitoring of the health of the network is the function of a
A)File server
B)SNMP
C)NOC
D)TOC
A)File server
B)SNMP
C)NOC
D)TOC
C
4
________ are types of magnetic media.
A)CDR,CDRW,DVD
B)Linux,Windows,Oracle
C)Hard drives,diskettes,tape
D)Keyboards,mouse,monitor
A)CDR,CDRW,DVD
B)Linux,Windows,Oracle
C)Hard drives,diskettes,tape
D)Keyboards,mouse,monitor
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Media can be divided into three categories:
A)Paper,plastic,cloth
B)Magnetic,optical,and electronic
C)Confidential,integrity,authority
D)Red,yellow,and blue
A)Paper,plastic,cloth
B)Magnetic,optical,and electronic
C)Confidential,integrity,authority
D)Red,yellow,and blue
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate
A)Laser
B)Optical
C)Magnetic
D)Static
A)Laser
B)Optical
C)Magnetic
D)Static
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
You are building a network and need to connect three different network segments,including the Internet.The device must enforce security policies and perform stateful packet filtering.The device you would use is a
A)Switch
B)Bridge
C)Router
D)Firewall
A)Switch
B)Bridge
C)Router
D)Firewall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
________ are applications designed to detect,log,and respond to unauthorized A.network or host use,both in real time and after the fact
A)Windows Operating System
B)Intrusion detection systems (IDS)
C)Firewalls
D)Twisted wire pairs
A)Windows Operating System
B)Intrusion detection systems (IDS)
C)Firewalls
D)Twisted wire pairs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is an extension of the public telephone network into a business?
A)PBX
B)COTS
C)SNMP
D)SMTP
A)PBX
B)COTS
C)SNMP
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
You are building a small network in the office.You will need to connect two different network segments that have different network addresses.What device will you use connect them?
A)Hub
B)Router
C)Switch
D)Server
A)Hub
B)Router
C)Switch
D)Server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
What protocol is used to manage IP address space?
A)ICMP
B)DHCP
C)TCP
D)SNMP
A)ICMP
B)DHCP
C)TCP
D)SNMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Which operating system is immune to virus attacks?
A)Windows 7
B)Red Hat Linux
C)Mac OS X
D)No operating system is immune.
A)Windows 7
B)Red Hat Linux
C)Mac OS X
D)No operating system is immune.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
You are building a network and need to connect five computers in an office.They will be on the same network segment and you should be able to perform some security functions such as port address security.What device would you use to connect the computers?
A)Switch
B)Hub
C)Router
D)Server
A)Switch
B)Hub
C)Router
D)Server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
_______ are characterized by the use of a laser to read data stored on a physical device.
A)Authentication rules
B)FTP sites
C)Modems
D)Optical media
A)Authentication rules
B)FTP sites
C)Modems
D)Optical media
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The following are steps in securing a workstation EXCEPT:
A)Install NetBIOS and IPX
B)Install antivirus
C)Remove unnecessary software
D)Disable unnecessary user accounts
A)Install NetBIOS and IPX
B)Install antivirus
C)Remove unnecessary software
D)Disable unnecessary user accounts
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Which device converts analog signals to digital signals and vice versa?
A)Switch
B)Hub
C)Modem
D)VPN
A)Switch
B)Hub
C)Modem
D)VPN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A virtual private network (VPN)is a construct used to provide
A)Users with their own web space on the network
B)An area of relaxation for employees
C)Secure communication channel between users across public networks such as the Internet
D)A learning area for programming languages
A)Users with their own web space on the network
B)An area of relaxation for employees
C)Secure communication channel between users across public networks such as the Internet
D)A learning area for programming languages
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A hub operates at
A)Layer 1,the physical layer
B)Layer 2,the data link layer
C)Layer 2,the MAC layer
D)Layer 3,the network layer
A)Layer 1,the physical layer
B)Layer 2,the data link layer
C)Layer 2,the MAC layer
D)Layer 3,the network layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A(n)_________ is a network device that can be hardware,software,or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet
A)blister pack
B)entity relationship diagram
C)server
D)firewall
A)blister pack
B)entity relationship diagram
C)server
D)firewall
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Network access control is
A)A Microsoft technology for controlling network access
B)A security methodology involved in managing endpoints as they connect on a case-by-case basis
C)The use of ACLs to permit network access
D)MAC filtering on wireless devices
A)A Microsoft technology for controlling network access
B)A security methodology involved in managing endpoints as they connect on a case-by-case basis
C)The use of ACLs to permit network access
D)MAC filtering on wireless devices
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The rules that define what traffic is permissible and what traffic is to be blocked or denied are called _______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
A bridge works on layer 3 of the OSI model.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Worms are software that attaches itself to a file and then executes on a machine.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
It is difficult to make precise connections with fiber optic cables,but they are inexpensive.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A network traffic management device used to connect different network segments together is called a(n)_______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
A computer in a network that hosts applications and data for everyone to share is called a(n)_______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
_______________ are devices designed to detect,log,and respond to unauthorized network or host use,both in real time and after the fact.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
The intentions of computer virus writers have changed over the years,from wanting to simply spread a virus and be noticed,to the work of today's stealthy botnet-creating criminals.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Managing the endpoints on a case-by-case basis as they connect is a security methodology known as _______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The machine that sits on a desktop and is used for sending and reading everyday e-mail,creating reports,or playing games is called the _______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The point of entry from a wireless device to a wired network is performed at a device called a(n)_______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
_______________ has a foil shield around the pairs of wire to provide extra shielding from electromagnetic interference.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
SMTP is a protocol for managing functions between devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The most common implementation of VPN is via IPsec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Hubs are the most common device used for connecting computers on a local area network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A(n)_______________ is a card with a connector port of a particular type of network connection,either Ethernet or Token Ring.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Category 5 cable is rated for 10-Mbps Ethernet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Infrared works like wireless in that it can penetrate walls.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Switches create one big collision domain for all connected devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Multiple operating systems can be operated concurrently on the same hardware using _______________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the four common methods for connecting equipment at the physical layer?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What are the different types of removable media?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck