Ch 7 - Administering a Secure Network

Descripción

Ch 7 quiz
C Danvers
Test por C Danvers, actualizado hace más de 1 año
C Danvers
Creado por C Danvers hace alrededor de 6 años
821
0

Resumen del Recurso

Pregunta 1

Pregunta
A correlation engine aggregates and correlates content from different sources to uncover an attack.
Respuesta
  • True
  • False

Pregunta 2

Pregunta
A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS) attacks.
Respuesta
  • True
  • False

Pregunta 3

Pregunta
An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?
Respuesta
  • 19
  • 21
  • 22
  • 20

Pregunta 4

Pregunta
A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
Respuesta
  • True
  • False

Pregunta 5

Pregunta
At what level of the OSI model does the IP protocol function?
Respuesta
  • Transport Layer
  • Data Link Layer
  • Presentation Layer
  • Network Layer

Pregunta 6

Pregunta
File integrity check (FIC) is a service that can monitor any changes made to computer files, such as operating system files.
Respuesta
  • True
  • False

Pregunta 7

Pregunta
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
Respuesta
  • MAC address
  • subnets
  • VLAN
  • IP address

Pregunta 8

Pregunta
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
Respuesta
  • port snooping
  • interface capture
  • port mirroring
  • port identity

Pregunta 9

Pregunta
In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
Respuesta
  • Software as a Service
  • Application as a Service
  • System as a Service
  • Infrastructure as a Service

Pregunta 10

Pregunta
On and SDN network, what specific unit gives traffic the permission to flow through the network?
Respuesta
  • SDN gateway
  • SDN router
  • SDN firewall
  • SDN controller

Pregunta 11

Pregunta
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
Respuesta
  • malware management
  • application whitelist
  • application control
  • inventory permissions

Pregunta 12

Pregunta
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
Respuesta
  • NIS
  • WINS
  • TACACS+
  • DNS

Pregunta 13

Pregunta
S/MIME can be used when mail is accessed through a web browser.
Respuesta
  • True
  • False

Pregunta 14

Pregunta
SNMP-managed devices must have an agent or a service that listens for commands and then executes them.
Respuesta
  • True
  • False

Pregunta 15

Pregunta
TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.
Respuesta
  • True
  • False

Pregunta 16

Pregunta
The most popular implementation of DNS is the Unix Internet Name Domain.
Respuesta
  • True
  • False

Pregunta 17

Pregunta
Trivial File Transfer Protocol (TFTP) uses a more memory when compared to FTP.
Respuesta
  • True
  • False

Pregunta 18

Pregunta
Type I hypervisors run on the host operating system.
Respuesta
  • True
  • False

Pregunta 19

Pregunta
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)
Respuesta
  • management plane
  • control plane
  • data plane
  • all of the above

Pregunta 20

Pregunta
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
Respuesta
  • router
  • switch
  • bridge
  • hub

Pregunta 21

Pregunta
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
Respuesta
  • SSL/TLS tap
  • SSL/TLS access point
  • SSL/TLS accelerator
  • SSL/TLS mirror

Pregunta 22

Pregunta
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
Respuesta
  • network tap
  • network mirror
  • shark box
  • shark tap

Pregunta 23

Pregunta
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
Respuesta
  • IPX/SPX
  • TCP/IP
  • Appletalk
  • UDP

Pregunta 24

Pregunta
What secure protocol is recommended for Network address translation?
Respuesta
  • S/MIME
  • IMAP
  • SRTP
  • IPsec

Pregunta 25

Pregunta
What secure protocol is recommended for time synchronization?
Respuesta
  • SRTP
  • NTP
  • S/MIME
  • POP

Pregunta 26

Pregunta
What secure protocol is recommended for voice and video?
Respuesta
  • IPsec
  • S/MIME
  • IMAP
  • SRTP

Pregunta 27

Pregunta
What specific issues are associated with log management? (Choose all that apply.)
Respuesta
  • The large volume of data that needs to be logged
  • The multiple devices generating logs
  • The different log formats
  • The fast network transfer speeds

Pregunta 28

Pregunta
What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?
Respuesta
  • cloud services
  • hosted services
  • volume computing
  • virtual services

Pregunta 29

Pregunta
What type of switch is used to combine multiple network connections into a single link?
Respuesta
  • gateway switch
  • core switch
  • access switch
  • aggregation switch

Pregunta 30

Pregunta
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?
Respuesta
  • centralized device log analyzer
  • system log manager
  • network log device
  • core device log analyzer

Pregunta 31

Pregunta
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
Respuesta
  • supervisor
  • hypervisor
  • hypercard
  • kernel

Pregunta 32

Pregunta
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
Respuesta
  • MIB
  • entity
  • community string
  • OID

Pregunta 33

Pregunta
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?
Respuesta
  • Sofware as a Service
  • System as a Service
  • Application as a Service
  • Infrastructure as a Service

Pregunta 34

Pregunta
Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?
Respuesta
  • Presentation Layer
  • Application Layer
  • Network Layer
  • Transport Layer

Pregunta 35

Pregunta
Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?
Respuesta
  • SDN
  • VDI
  • PaaS
  • SaaS

Pregunta 36

Pregunta
Which of the following protocols is unsecured?
Respuesta
  • SSL
  • TLS
  • HTTPS
  • FTP

Pregunta 37

Pregunta
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?
Respuesta
  • FTP
  • SRTP
  • SNMP
  • TCP/IP

Pregunta 38

Pregunta
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?
Respuesta
  • PaaS
  • cloud computing
  • IaaS
  • virtualization
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002