3.00 Flashcards

1
Q

What is a DMZ?

A

A DMZ, or a demilitarized zone, is used to connect hosts and provides an interface to an untrusted external network while keeping the internal, private network separated and isolated from the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between an extranet and an intranet?

A

An intranet is used for internal employees, while an extranet allows outside vendors to access information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the purpose of a VLAN.

A

A VLAN is a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire but are located on several different LAN segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some ways to secure a VLAN?

A

Some examples to secure a VLAN are:

  • Place the router in a locked and restricted area.
  • Ensure the VLAN is password protected.
  • Configure the switch so each user has a unique login and password.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is anti-virus software used for?

A

Anti-virus software is used to prevent hackers from deploying malicious software on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is role-based control used?

A

RBC is used for configuring hardware so each user has a unique username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a security policy?

A

A security policy is a list of regulations employees must adhere to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is network access control?

A

NAC is a type of access control that can deny network access to noncompliant devices and place them in quarantine. This keeps the network secure and prevents dangerous activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the difference between a permanent and a dissolvable agent?

A

A permanent agent is installed and remains on a client.

A dissolvable agent is downloaded and installed when a client logs on to the network remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IAAA?

A

Identification, Authentication, Authorization, and Accounting (IAAA) is the system used to describe the framework for controlling access to computer resources, controlling usage, and implementing procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is two-factor authentication?

A

Two-factor authentication (2FA) builds on passwords to add another layer of security. 2FA combines something like a smart card with something you know, like a PIN or password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a password hash?

A

A password hash is where a password is turned into a scrambled representation of itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is deciphering?

A

Deciphering is the process of converting text written in code into normal language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cryptography?

A

Cryptography is the process of creating written or generated code that allows information to be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is WPA?

A

WPA is a security protocol designed to create secure wireless (Wi-Fi) networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly