Beyond the Basic LAN Flashcards
Which of the following would be considered static hosts? (Choose all that apply.)
HVAC systems controlled by remote access over an IP network
Game consoles with Internet access
A user workstation in an office
A pumping mechanism in a sewage treatment plant that uses an embedded Linux operating system
HVAC systems controlled by remote access over an IP network
Game consoles with Internet access
A pumping mechanism in a sewage treatment plant that uses an embedded Linux operating system
User workstations in an office would not be considered as static or specialized hosts
Which of the following terms describes the use of several different manufacturers and models of Web proxy devices in a layered security architecture?
Control compensation
Control redundancy
Control diversity
Control diversity
Control diversity is a concept that describes the use of several different manufacturers and models of Web proxy devices in layered security architectures
Which of the following refers to a programming or software-based interface used to manage connections and traffic access to and from a host?
Firewall
Wrapper
Firmware
Wrapper
A wrapper is a programming or software-based interface used to manage connections and traffic access to and from a host
All of the following are characteristics of fencing you should consider when deploying it around your facility, except:
Height
Mesh
Fire rating
Fire rating
Fire rating is not a consideration when deploying fencing, since fences are not designed to prevent or suppress the spread of fires
Your manager wants you to deploy signage around your facility that expressly warns potential intruders that the facility is alarmed and that intruders will be met with armed response. In this situation, what kind of control functionality is the signage fulfilling?
Preventative
Deterrent
Compensating
Deterrent
In this situation the signage is acting as a deterrent control, since it relies on potential intruders knowing about what it says and understanding the consequences in order for it to be effective
Which of the following can happen if an attacker sets the power levels on a rogue access point to overpower the wireless transmissions of a legitimate access point?
Jamming
Beaconing
Deauthentication
Jamming
Jamming can occur if an attacker sets the power levels on a rogue access point to overpower the wireless transmissions of a legitimate access point
Computer-based measures that you might encounter in everyday hands-on security, such as firewalls, encryption technologies, access control lists on routers, and secure protocols are what type of control?
Deterrent
Physical
Technical
Technical
Technical, or logical, controls—such as firewalls, encryption technologies, access control lists on routers, and secure protocols—are the typical computer-based measures that you might encounter in everyday hands-on security
Which of the following technologies requires that two devices be touching each other in order to communicate?
WPA
Bluetooth
NFC
NFC
NFC requires that two devices be touching each other in order to communicate
Your manager wants you to make sure that enough fire extinguishers are available in the data center to take care of possible electrical fires. Which class of fire extinguishers should be used in the data center?
Class A
Class B
Class C
Class C
Class C fire extinguishers are the appropriate type used in electrical fires
Heating, ventilation, and air conditioning (HVAC) systems control all of the following environmental factors in a data center, except:
Power
Temperature
Humidity
Power
Power is not controlled by HVAC systems