Deck 8: Administering a Secure Network

Full screen (f)
exit full mode
Question
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Use Space or
up arrow
down arrow
to flip the card.
Question
What is the term used for a device that requests permission from an authenticator to join a network?​

A)​Remote client
B)​Supplicant
C)Widget
D)​Requester
Question
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

A)kernel
B)supervisor
C)hypercard
D)hypervisor
Question
DNS poisoning can be prevented using the latest edition of what software below?

A)BIND
B)DHCP
C)WINS
D)finger
Question
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?

A)IEEE 802.3ad
B)IEEE 802.11n
C)IEEE 802.1x
D)IEEE 802.1z
Question
IP telephony and Voice over IP (VoIP) are identical.
Question
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?

A)Application Layer
B)Presentation Layer
C)Network Layer
D)Transport Layer
Question
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

A)WINS
B)NIS
C)TACACS+
D)DNS
Question
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?

A)Cloud Application as a Service
B)Cloud Infrastructure as a Service
C)Cloud Software as a Service
D)Cloud System as a Service
Question
IEEE 802.1x is commonly used on wireless networks.
Question
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

A)VLAN
B)subnets
C)IP address
D)MAC address
Question
What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?

A)​SSH
B)​Telnet
C)​NetBIOS
D)​DHCP
Question
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:

A)flood guard
B)protocol guard
C)link guard
D)frame guard
Question
Which of the following is not a benefit that can be provided by using IP telephony?​

A)​Simplified management
B)​Decreased network utilization
C)Reduced infrastructure requirements
D)​Increased user productivity
Question
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?

A)19
B)20
C)21
D)22
Question
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Question
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
Question
The capability for devices to exchange low-level control messages is provided by what protocol below?

A)ICMP
B)FTP
C)UDP
D)TCP
Question
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

A)entity
B)community string
C)MIB
D)OID
Question
​What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?

A)​Static
B)​Dynamic
C)​Sticky
D)​Permissive
Question
At what level of the OSI model does the IP protocol function?

A)Transport Layer
B)Network Layer
C)Data link Layer
D)Presentation Layer
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An instance of a particular state of a virtual machine that can be saved for later use.
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
Question
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
Question
A(n) ____________________ is a record of events that occur.
Question
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

A)UDP
B)IPX/SPX
C)TCP/IP
D)Appletalk
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​The ability to easily expand or contract resources in a virtualized environment.
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A means of managing and presenting computer resources by function without regard to their physical layout or location.​
Question
In what type of cloud computing does the customer have the highest level of control?

A)Cloud Application as a Service
B)Cloud Infrastructure as a Service
C)Cloud Software as a Service
D)Cloud System as a Service
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A log that is used to record which user performed an action and what that action was.​
Question
The ____________ is a high-speed storage network protocol that can transmit up to 16 gigabits per second.​
Question
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

A)bridge
B)router
C)switch
D)hub
Question
The ____________________ Layer is omitted in the TCP/IP model.
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An older TCP/IP protocol and an application used for text-based commmunication
Question
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?

A)Virtual trunking protocol
B)Dijkstra's algorithm
C)802.11x
D)802.1d
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​Log that documents any unsuccessful events and the most significant successful events.
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An unsecure TCP/IP protocol that is commonly used for transferring files
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.​
Question
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)​
Question
Describe one way to use FTP on a local host computer.
Question
List the steps in an 802.1x authentication procedure.
Question
What are the two types of community strings?
Question
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Question
List and describe three benefits offered by IP telephony.
Question
List the steps of a DNS lookup.
Question
List and describe the three service models of cloud computing.
Question
Why is the Physical Layer omitted in the TCP/IP model?
Question
Discuss one security advantage to hosts running virtualization.
Question
What are the four fields contained within an ICMP message?​
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Administering a Secure Network
1
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
False
2
What is the term used for a device that requests permission from an authenticator to join a network?​

A)​Remote client
B)​Supplicant
C)Widget
D)​Requester
B
3
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

A)kernel
B)supervisor
C)hypercard
D)hypervisor
D
4
DNS poisoning can be prevented using the latest edition of what software below?

A)BIND
B)DHCP
C)WINS
D)finger
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?

A)IEEE 802.3ad
B)IEEE 802.11n
C)IEEE 802.1x
D)IEEE 802.1z
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
IP telephony and Voice over IP (VoIP) are identical.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?

A)Application Layer
B)Presentation Layer
C)Network Layer
D)Transport Layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

A)WINS
B)NIS
C)TACACS+
D)DNS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?

A)Cloud Application as a Service
B)Cloud Infrastructure as a Service
C)Cloud Software as a Service
D)Cloud System as a Service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
IEEE 802.1x is commonly used on wireless networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

A)VLAN
B)subnets
C)IP address
D)MAC address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?

A)​SSH
B)​Telnet
C)​NetBIOS
D)​DHCP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:

A)flood guard
B)protocol guard
C)link guard
D)frame guard
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not a benefit that can be provided by using IP telephony?​

A)​Simplified management
B)​Decreased network utilization
C)Reduced infrastructure requirements
D)​Increased user productivity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?

A)19
B)20
C)21
D)22
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The capability for devices to exchange low-level control messages is provided by what protocol below?

A)ICMP
B)FTP
C)UDP
D)TCP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

A)entity
B)community string
C)MIB
D)OID
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
​What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?

A)​Static
B)​Dynamic
C)​Sticky
D)​Permissive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
At what level of the OSI model does the IP protocol function?

A)Transport Layer
B)Network Layer
C)Data link Layer
D)Presentation Layer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An instance of a particular state of a virtual machine that can be saved for later use.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ is a record of events that occur.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

A)UDP
B)IPX/SPX
C)TCP/IP
D)Appletalk
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​The ability to easily expand or contract resources in a virtualized environment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A means of managing and presenting computer resources by function without regard to their physical layout or location.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
In what type of cloud computing does the customer have the highest level of control?

A)Cloud Application as a Service
B)Cloud Infrastructure as a Service
C)Cloud Software as a Service
D)Cloud System as a Service
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A log that is used to record which user performed an action and what that action was.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
The ____________ is a high-speed storage network protocol that can transmit up to 16 gigabits per second.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

A)bridge
B)router
C)switch
D)hub
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The ____________________ Layer is omitted in the TCP/IP model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An older TCP/IP protocol and an application used for text-based commmunication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?

A)Virtual trunking protocol
B)Dijkstra's algorithm
C)802.11x
D)802.1d
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​Log that documents any unsuccessful events and the most significant successful events.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
​An unsecure TCP/IP protocol that is commonly used for transferring files
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Matching
a. Audit log
b. Event log
c. File Transfer Protocol (FTP)
d. Flood guard
e. FTP Secure (FTPS)
f. Host elasticity
g. Loop protection
h. Snapshot
i. Telnet
j. Virtualization
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe one way to use FTP on a local host computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
List the steps in an 802.1x authentication procedure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
What are the two types of community strings?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss the problems associated with storing the entire database of names and IP addresses in one location.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
List and describe three benefits offered by IP telephony.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List the steps of a DNS lookup.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
List and describe the three service models of cloud computing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Why is the Physical Layer omitted in the TCP/IP model?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss one security advantage to hosts running virtualization.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the four fields contained within an ICMP message?​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.