Ch.8 Flashcards
a log that can provide details regarding requests for specific files on a system
access log
a log that is used to record which user perrformed an action and what that action was
audit log
a pay-per-use computing model in which customers pay only for the online computing resources that they need, and the resources can be easily scaled
cloud computing
a cloud system that has no computational capabilities but provides remote file storage
cloud storage
a cloud that is open only to specific organizations that have common concerns
community cloud
a security technique to turn off ports on a network device that are not required
disabling unused interfaces
log that documents any unsuccessful events and the most significant successful events
event log
a high-speed storage network protocol that can transmit up to 16 gigabits per second
Fibre Channel (FC)
a high-speed storage network protocol that encapsulates Fibre Channel frames over Ethernet networks
Fibre Channel over Ethernet (FCoE)
an unsecure TCP/IP protocol that is commonly used for transferring files
File Transfer Protocol (FTP)
a feature that controls a device’s tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack
flood guard
a TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session
FTP Secure (FTPS)
the ability to quickly make new virtual server machines available
host availability
the ability to easily expand or contract resources in a virtualized environment
host elasticity
a type of virtualization in which an entire operating system environment is simulated
host virtualization
a combination of public and private clouds
hybrid cloud
a standard that authenticates users on a per-switch port basis by permitting access to valid users but effectively disabling the port if authentication fails
IEEE 802.1X
a cloud computing model in which customers have the highest level of control and can deploy and run their own software
Infrastructure as a Service (IaaS)
a TCP/IP protocol that is used by devices to communicate updates or error information to other devices
Internet Control Message Protocol (ICMP)
the next generation of the IP protocol that addresses weaknesses of IPv4 and provides several significant improvements
Internet Protocol version 6 (IPv6)
using a data-based IP network to add digital voice clients and network
IP telephony
an IP-based storage networking standard for linking data storage facilities
iSCSI (Internet Small computer System Interface)
a record of events that occur
log
technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)
loop protection
a security technique to limit the number of media access control (MAC) addresses allowed on a single port
MAC limiting and filtering
an older transport protocol used by Microsoft Windows systems for allowing applications on separate computers to communicate over a LAN
netBIOS (Network Basic Input/Output System)
the impact of a patch on other software or even hardware
patch compatibility
a cloud service in which cosumers can install and run their own specialized applications on the cloud computing network
Platform as a Service (Paas)
a cloud that is created and maintained on a private network
private cloud
a cloud in which the services and infrastructure are offered to all users with access provided remotely through the Internet
public cloud
the process of administration that relies on following procedural and technical rules
rule-based management
using a virtual machine to run a suspicious program to determine if it is malware
sandboxing
a TCP/IP protocol used mainly on UNIX and LINUX devices that securely transports files by encrypting files and commands
Secure Copy Protocol (SCP)
a secure TCP/IP protocol that is used for transporting files by encrypting and compressing all data and commands
Secure FTP (SFTP)
testing the existing security configuration
security control testing
log that can reveal the types of attacks that are being directed at the network and if any of the attacks were successful
security log
a TCP/IP protocol that exchanges management information between networked devices. It allows network administrators to remotely monitor, manage, and configure devices on the network
Simple Network Management Protocol (SNMP)
a model of cloud computing in which the vendor provides access to the vendor’s software applications running on a cloud infrastructure
Software as a Service (Saas)
a dedicated network storage facility that provides access to data storage over a high-speed network
storage area network (SAN)
an older TCP/IP protocol and an application used for text-based communication
telnet
the most common protocol suite used today for local area networks (LANs) and the Internet
Transmission Control Protocol/Internet Protocol (TCP/IP)
a light version of FTP that uses a small amount of memory and has limited functionality
Trivial File Transfer Protocol (TFTP)
a means of managing and presenting computer resources by function without regard to their physical layout or location
virtualization
Which high-speed storage network protocols used by a SAN is IP-based?
a. iSCSI
b. FC
c. FCoE
d. XSAN
a
Which Fibre Channel zone is the most restrictive?
a. FC hard zone
b. FC soft zone
c. FC port zone
d. FC interface zone
a
An attacker can use NetBIOS to determine each of the following EXCEPT _____.
a. computer names
b. contents of the remote name cache
c. list of remote NetBIOS names
d. list of resolved names
c
Which type of log can provide details regarding requests for specific files on a system?
a. event log
b. access log
c. audit log
d. SysFile log
c
Which type of cloud is offered to all users?
a. hybrid cloud
b. private cloud
c. public cloud
d. community cloud
c
Which of these would NOT be valid Internet Control Message Protocol (ICMP) error message?
a. Host Unreachable
b. Network Unreachable
c. Destination Network Unknown
d. Router Delay
d
Internet Control Message Protocol (ICMP) is used by each of these attacks EXCEPT _____.
a. ICMP poisoning
b. smurf DoS attack
c. ICMP redirect attack
d. ping of death
a
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
a. SNMPv2
b. SNMPv3
c. SNMPv4
d. SNMPv5
b
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
a. DNS replay
b. DNS masking
c. DNS poisoning
d. DNS forwarding
c
Which of these is the most secure protocol for transferring files?
a. SCP
b. SFTP
c. FTPS
d. FTP
b
Each of these is a technique for securing a router EXCEPT _____.
a. making all configuration changes remotely
b. securing all ports
c. setting a strong administrator password
d. using a meaningful router name
a
Which statement about a flood guard is true?
a. It is a separate hardware appliance that is located inside the DMZ
b. It prevents DoS or DDoS attacks
c. It can be used on either local host systems or network devices
d. It protects a router form password intrustions
b
Each of these is an entry in a firewall log that should be investigated EXCEPT _____.
a. IP addresses that are being rejected and dropped
b. successful logins
c. suspicious outbound connections
d. IP addresses that are being rejected and dropped
b
If a group of users must be separated from other users, which is the most secure network design?
a. Use a VLAN
b. Connect them to different switches and routers
c. Use a subnet mask
d. It is impossible to separate users on a network.
b
Why is loop protection necessary?
a. It makes a DMZ more secure
b. it denies attackers from launching DDoS attacks
c. It prevents a broadcast storm that can cripple a network
d. It must be installed before IEEE 802.1d can e implemented
c
What does MAC limiting and filtering do?
a. It limits devices that can connect to a switch
b. It allows only approved wireless devices to connect to a network
c. It prevents Address Resolution Protocol spoofing
d. It provides security for a router
a
In a network using IEEE 802.1x, a supplicant _____.
a. must use IEEE 802.11d to connect to the network
b. makes a request to the authenticator
c. contacts the authentication server directly
d. can only be a wireless device
b
Which statement is true regarding security for a computer that boots to Apple Mac OS X and then runs a Windows virtual machine?
a. The security of the apple Mac OS X completely protects the Windows virtual machine.
b. The hypervisor protects both the Apple Mac OS X and Windows operating systems
c. The security of the Windows virtual machine completely protects the Apple Mac OS X
d. The Windows virtual machine needs its own security
d
Which of the following is NOT a security concern of virtualized environments?
a. virtual machines must be protected from both the outside world and also from other virtual machines on the same physical computer
b. Physical security appliances are not always designed to protect virtual systems
c. Virtual servers are less expensive than their physical counterparts
d. Live migration can immediately move one virtualized server to another hypervisor
c