Chapter 8 Review Questions

Description

Chapter 8 Review Questions for Exam 2
Odin D.
Flashcards by Odin D., updated more than 1 year ago
Odin D.
Created by Odin D. over 6 years ago
10
0

Resource summary

Question Answer
What high-speed storage network protocols used by a SAN is IP-based? iSCSI
Which Fibre Channel zone is the most restrictive? FC hard zone
An attacker can use NetBIOS to determine each of the following EXCEPT __________. list of remote NetBIOS names
Which type of log can provide details regarding requests for specific files on a system? access log
Which type of device log contains the most beneficial security data? firewall log
Which type of cloud is offered to all users? public cloud
Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message? Router Delay
Internet Control Message Protocol (ICMP) is used by each of these attacks EXCEPT _________. ICMP poisoning
Which version of Simple Network Management Protocol (SNMP) is considered the most secure? SNMPv3
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name? DNS poisoning
SFTP Which of these is the most secure protocol for transferring files?
Each of these is a technique for securing a router EXCEPT _________. making all configuration changes remotely
Which statement about a flood guard is true? It prevents DoS or DDoS attacks
Each of these is an entry in a firewall log that should be investigated EXCEPT ___________. successful logins
If a group of users must be separated from other users, which is the most secure network design? Connect them to different switches and routers
Why is loop protection necessary? It prevents a broadcast storm that can cripple a network
What does MAC limiting and filtering do? It limits devices that can connect to a switch
In a network using IEEE 802.1x a supplicant __________. makes a request to the authenticator
Which statement is true regarding security for a computer that boots to Apple Mac OS X and then runs a Windows virtual machine? The Windows virtual machine needs its own security
Which of the following is NOT a security concern of virtualized environments? Virtual servers are less expensive than their physical counterparts
Show full summary Hide full summary

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr