Ch.8 Flashcards

1
Q

a log that can provide details regarding requests for specific files on a system

A

access log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a log that is used to record which user perrformed an action and what that action was

A

audit log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled

A

cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a cloud system that has no computational capabilities but provides remote file storage

A

cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a cloud that is open only to specific organizations that have common concerns

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a security technique to turn off ports on a network device that are not required

A

disabling unused interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

log that documents any unsuccessful events and the most significant successful events

A

event log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a high-speed storage network protocol that can transmit up to 16 gigabits per second

A

Fibre Channel (FC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks

A

Fibre Channel over Ethernet (FCoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an unsecure TCP/IP protocol that is commonly used for transferring files

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a feature that controls a device’s tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack

A

flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session

A

FTP Secure (FTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the ability to quickly make new virtual server machines available

A

host availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the ability to easily expand or contract resources in a virtualized environment

A

host elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a type of virtualization in which an entire operating system environment is simulated

A

host virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a combination of public and private clouds

A

hybrid cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails

A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a cloud computing model in which customers have the highest level of control and can deploy and run their own software

A

Infrastructure as a Service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a TCP/IP protocol that is used by devices to communicate updates or error information to other devices

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements

A

Internet Protocol version 6 (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

using a data-based IP network to add digital voice clients and network

A

IP telephony

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

an IP-based storage networking standard for linking data storage facilities

A

iSCSI (Internet Small computer System Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a record of events that occur

A

log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)

A

loop protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

a security technique to limit the number of media access control (MAC) addresses allowed on a single port

A

MAC limiting and filtering

26
Q

an older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN

A

netBIOS (Network Basic Input/Output System)

27
Q

the impact of a patch on other software or even hardware

A

patch compatibility

28
Q

a cloud service in which cosumers can install and run their own specialized applications on the cloud computing network

A

Platform as a Service (Paas)

29
Q

a cloud that is created and maintained on a private network

A

private cloud

30
Q

a cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet

A

public cloud

31
Q

the process of administration that relies on following procedural and technical rules

A

rule-based management

32
Q

using a virtual machine to run a suspicious program to determine if it is malware

A

sandboxing

33
Q

a TCP/IP protocol used mainly on UNIX and LINUX devices that securely transports files by encrypting files and commands

A

Secure Copy Protocol (SCP)

34
Q

a secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands

A

Secure FTP (SFTP)

35
Q

testing the existing security configuration

A

security control testing

36
Q

log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful

A

security log

37
Q

a TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network

A

Simple Network Management Protocol (SNMP)

38
Q

a model of cloud computing in which the vendor provides access to the vendor’s software applications running on a cloud infrastructure

A

Software as a Service (Saas)

39
Q

a dedicated network storage facility that provides access to data storage over a high-speed network

A

storage area network (SAN)

40
Q

an older TCP/IP protocol and an application used for text-based communication

A

telnet

41
Q

the most common protocol suite used today for local area networks (LANs) and the Internet

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

42
Q

a light version of FTP that uses a small amount of memory and has limited functionality

A

Trivial File Transfer Protocol (TFTP)

43
Q

a means of managing and presenting computer resources by function without regard to their physical layout or location

A

virtualization

44
Q

Which high-speed storage network protocols used by a SAN is IP-based?

a. iSCSI
b. FC
c. FCoE
d. XSAN

A

a

45
Q

Which Fibre Channel zone is the most restrictive?

a. FC hard zone
b. FC soft zone
c. FC port zone
d. FC interface zone

A

a

46
Q

An attacker can use NetBIOS to determine each of the following EXCEPT _____.

a. computer names
b. contents of the remote name cache
c. list of remote NetBIOS names
d. list of resolved names

A

c

47
Q

Which type of log can provide details regarding requests for specific files on a system?

a. event log
b. access log
c. audit log
d. SysFile log

A

c

48
Q

Which type of cloud is offered to all users?

a. hybrid cloud
b. private cloud
c. public cloud
d. community cloud

A

c

49
Q

Which of these would NOT be valid Internet Control Message Protocol (ICMP) error message?

a. Host Unreachable
b. Network Unreachable
c. Destination Network Unknown
d. Router Delay

A

d

50
Q

Internet Control Message Protocol (ICMP) is used by each of these attacks EXCEPT _____.

a. ICMP poisoning
b. smurf DoS attack
c. ICMP redirect attack
d. ping of death

A

a

51
Q

Which version of Simple Network Management Protocol (SNMP) is considered the most secure?

a. SNMPv2
b. SNMPv3
c. SNMPv4
d. SNMPv5

A

b

52
Q

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?

a. DNS replay
b. DNS masking
c. DNS poisoning
d. DNS forwarding

A

c

53
Q

Which of these is the most secure protocol for transferring files?

a. SCP
b. SFTP
c. FTPS
d. FTP

A

b

54
Q

Each of these is a technique for securing a router EXCEPT _____.

a. making all configuration changes remotely
b. securing all ports
c. setting a strong administrator password
d. using a meaningful router name

A

a

55
Q

Which statement about a flood guard is true?

a. It is a separate hardware appliance that is located inside the DMZ
b. It prevents DoS or DDoS attacks
c. It can be used on either local host systems or network devices
d. It protects a router form password intrustions

A

b

56
Q

Each of these is an entry in a firewall log that should be investigated EXCEPT _____.

a. IP addresses that are being rejected and dropped
b. successful logins
c. suspicious outbound connections
d. IP addresses that are being rejected and dropped

A

b

57
Q

If a group of users must be separated from other users, which is the most secure network design?

a. Use a VLAN
b. Connect them to different switches and routers
c. Use a subnet mask
d. It is impossible to separate users on a network.

A

b

58
Q

Why is loop protection necessary?

a. It makes a DMZ more secure
b. it denies attackers from launching DDoS attacks
c. It prevents a broadcast storm that can cripple a network
d. It must be installed before IEEE 802.1d can e implemented

A

c

59
Q

What does MAC limiting and filtering do?

a. It limits devices that can connect to a switch
b. It allows only approved wireless devices to connect to a network
c. It prevents Address Resolution Protocol spoofing
d. It provides security for a router

A

a

60
Q

In a network using IEEE 802.1x, a supplicant _____.

a. must use IEEE 802.11d to connect to the network
b. makes a request to the authenticator
c. contacts the authentication server directly
d. can only be a wireless device

A

b

61
Q

Which statement is true regarding security for a computer that boots to Apple Mac OS X and then runs a Windows virtual machine?

a. The security of the apple Mac OS X completely protects the Windows virtual machine.
b. The hypervisor protects both the Apple Mac OS X and Windows operating systems
c. The security of the Windows virtual machine completely protects the Apple Mac OS X
d. The Windows virtual machine needs its own security

A

d

62
Q

Which of the following is NOT a security concern of virtualized environments?

a. virtual machines must be protected from both the outside world and also from other virtual machines on the same physical computer
b. Physical security appliances are not always designed to protect virtual systems
c. Virtual servers are less expensive than their physical counterparts
d. Live migration can immediately move one virtualized server to another hypervisor

A

c