Deck 11: Network Management and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
Play
Full screen (f)
Deck 11: Network Management and Security
1
A ____ looks at the long-term operation of the business, so a business should develop two plans.
A) business continuity plan
B) disaster recovery plan
C) business recovery plan
D) disaster prevention plan
A) business continuity plan
B) disaster recovery plan
C) business recovery plan
D) disaster prevention plan
A
2
A denial-of-service attack (DOS attack) is characterized by an attempt to prevent legitimate users of a service from using that service.
True
3
A(n) ____ is a stand-alone hardware unit that connects to the network or a software program running on a network host, collecting statistical information about the network performance.
A) program analyzer
B) packet analyzer
C) interface analyzer
D) protocol analyzer
A) program analyzer
B) packet analyzer
C) interface analyzer
D) protocol analyzer
D
4
____________________ hardening involves updating or patching applications as required, as well as properly administering usernames and passwords (changing default usernames and passwords).
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
____________________ is a security measure that uses the public network infrastructure, such as the Internet, as part of a Virtual Private Network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ uses a special switch (typically utilizing Fibre Channel technology) to connect servers and storage devices on their own physical network.
A) NAS
B) SAN
C) SAD
D) SAS
A) NAS
B) SAN
C) SAD
D) SAS
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.
A) private LAN
B) software LAN
C) segmented LAN
D) virtual LAN
A) private LAN
B) software LAN
C) segmented LAN
D) virtual LAN
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a technology where high-capacity file storage is directly connected to the network.
A) NAS
B) SAN
C) MAS
D) NAD
A) NAS
B) SAN
C) MAS
D) NAD
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
A) computer virus
B) Trojan
C) worm
D) rootkit
A) computer virus
B) Trojan
C) worm
D) rootkit
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____________________ allows you to connect the keyboard, video, and mouse signals from two or more computers to a single keyboard, video monitor, and mouse.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
A(n) ____________________ is a program that replicates itself, but does not necessarily infect other programs.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
Network security begins with the security measures in place on the server.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) ____________________ device is a network device that you can manage via a network connection, either through an ordinary browser or through special management software that comes with the device.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit, requiring the most amount of inspection time per packet.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
Integrity of information is achieved through encryption.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.
A) Network
B) System
C) Application
D) Operating system
A) Network
B) System
C) Application
D) Operating system
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
Network management is one of the most important tasks that is performed in a networked computer environment.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
The ____ module converts the server's keyboard, video, and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.
A) AICC
B) UICC
C) RICC
D) GICC
A) AICC
B) UICC
C) RICC
D) GICC
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ____ combines traffic sniffing with analysis techniques.
A) firewall
B) intrusion detection system
C) router
D) application firewall
A) firewall
B) intrusion detection system
C) router
D) application firewall
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
____ hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network.
A) Network
B) System
C) Application
D) Operating system
A) Network
B) System
C) Application
D) Operating system
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
List and describe the different types of hardening.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
What is a firewall?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss the advantage of having a disk image.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
List and describe five areas to consider in User Management.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck