Deck 11: Network Management and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 11: Network Management and Security
1
A(n)____________________ is a program that replicates itself,but does not necessarily infect other programs.
worm
2
A denial-of-service attack (DOS attack)is characterized by an attempt to prevent legitimate users of a service from using that service.
True
3
A(n)____________________ allows you to connect the keyboard,video,and mouse signals from two or more computers to a single keyboard,video monitor,and mouse.
KVM Switch
4
____________________ is a security measure that uses the public network infrastructure,such as the Internet,as part of a Virtual Private Network.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit,requiring the most amount of inspection time per packet.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
Integrity of information is achieved through encryption.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.
A)private LAN
B)software LAN
C)segmented LAN
D)virtual LAN
A)private LAN
B)software LAN
C)segmented LAN
D)virtual LAN
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
A ____ uses a special switch (typically utilizing Fibre Channel technology)to connect servers and storage devices on their own physical network.
A)NAS
B)SAN
C)SAD
D)SAS
A)NAS
B)SAN
C)SAD
D)SAS
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
____ hardening involves the use of routers,firewalls,IDS systems,and fault tolerance to help provide a protected and highly-available network.
A)Network
B)System
C)Application
D)Operating system
A)Network
B)System
C)Application
D)Operating system
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____ combines traffic sniffing with analysis techniques.
A)firewall
B)intrusion detection system
C)router
D)application firewall
A)firewall
B)intrusion detection system
C)router
D)application firewall
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.
A)program analyzer
B)packet analyzer
C)interface analyzer
D)protocol analyzer
A)program analyzer
B)packet analyzer
C)interface analyzer
D)protocol analyzer
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.
A)computer virus
B)Trojan
C)worm
D)rootkit
A)computer virus
B)Trojan
C)worm
D)rootkit
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ looks at the long-term operation of the business,so a business should develop two plans.
A)business continuity plan
B)disaster recovery plan
C)business recovery plan
D)disaster prevention plan
A)business continuity plan
B)disaster recovery plan
C)business recovery plan
D)disaster prevention plan
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ module converts the server's keyboard,video,and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.
A)AICC
B)UICC
C)RICC
D)GICC
A)AICC
B)UICC
C)RICC
D)GICC
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Network management is one of the most important tasks that is performed in a networked computer environment.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
____ is a technology where high-capacity file storage is directly connected to the network.
A)NAS
B)SAN
C)MAS
D)NAD
A)NAS
B)SAN
C)MAS
D)NAD
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Network security begins with the security measures in place on the server.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
____________________ hardening involves updating or patching applications as required,as well as properly administering usernames and passwords (changing default usernames and passwords).
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
A(n)____________________ device is a network device that you can manage via a network connection,either through an ordinary browser or through special management software that comes with the device.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
____ hardening involves disabling non-essential protocols and services,installing up-to-date service packs,patches,and hotfixes,and properly establishing access control permissions.
A)Network
B)System
C)Application
D)Operating system
A)Network
B)System
C)Application
D)Operating system
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Includes planning and methodologies designed to reduce or eliminate threats
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Includes planning and methodologies designed to reduce or eliminate threats
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
List and describe the different types of hardening.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
What is a firewall?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has all equipment required to maintain network communication and other services as well as current data
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has all equipment required to maintain network communication and other services as well as current data
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Includes the methods used to regulate what packets are transmitted
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Includes the methods used to regulate what packets are transmitted
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
List and describe five areas to consider in User Management.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
MATCHING
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has the minimal networking hardware required to maintain network communication,but requires restoration from the most recent backup to become operational
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has the minimal networking hardware required to maintain network communication,but requires restoration from the most recent backup to become operational
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss the advantage of having a disk image.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has no networking equipment or backup data,just electricity,space for equipment,and possibly bathrooms
Match each item with a statement below.
a.Disaster recovery
d.Cold site
b.Warm site
e.Hot site
c.Network security
Has no networking equipment or backup data,just electricity,space for equipment,and possibly bathrooms
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck