Chapter 07 Quiz – Administering a Secure Network Flashcards

Questions 21

1
Q

Question # 01

TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question # 02

S/MIME can be used when mail is accessed through a web browser.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question # 03

A correlation engine aggregates and correlates content from different sources to uncover an attack.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 04

Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?

a. Application Layer
b. Presentation Layer
c. Network Layer
d. Transport Layer

A

d. Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question # 05

DNS poisoning can be prevented using the latest edition of what software below?

a. BIND
b. DHCP
c. WINS
d. finger

A

a. BIND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question # 06

An administrator needs to examine FTP commands that are being passed to a server.
What port should the administrator be monitoring?

a. 19
b. 20
c. 21
d. 22

A

c. 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question # 07

Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor’s software applications running on a cloud infrastructure?

a. Application as a Service
b. Infrastructure as a Service
c. Software as a Service
d. System as a Service

A

c. Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question # 08

Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

a. TCP/IP
b. FTP
c. SNMP
d. SRTP

A

c. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question # 09

Which of the following protocols is unsecured?

a. HTTPS
b. TLS
c. SSL
d. FTP

A

d. FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question # 10

What secure protocol is recommended for time synchronization?

a. SRTP
b. S/MIME
c. NTP
d. POP

A

c. NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question # 11

What secure protocol is recommended for voice and video?

a. SRTP
b. S/MIME
c. IMAP
d. IPsec

A

a. SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question # 12

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?

a. interface capture
b. port identity
c. port snooping
d. port mirroring

A

d. port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question # 13

What hardware device can be inserted into a network to allow an administrator to monitor traffic?

a. network tap
b. network mirror
c. shark box
d. shark tap

A

a. network tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question # 14

What type of switch is used to combine multiple network connections into a single link?

a. core switch
b. gateway switch
c. aggregation switch
d. access switch

A

c. aggregation switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question # 15

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

a. malware management
b. inventory permissions
c. application whitelist
d. application control

A

c. application whitelist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question # 16

What secure protocol is recommended for Network address translation?

a. SRTP
b. S/MIME
c. IMAP
d. IPsec

A

d. IPsec

17
Q

Question # 17

What specific issues are associated with log management?

(Choose all that apply.)

a. The multiple devices generation logs.
b. The different log formats.
c. The fast network transfer speeds.
d. The large volume of data that needs to be logged.

A

a. The multiple devices generation logs.
b. The different log formats.
d. The large volume of data that needs to be logged.

18
Q

Question # 18

Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?

a. IaaS
b. cloud computing
c. virtualization
d. PaaS

A

c. virtualization

19
Q

Question # 19

What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?

a. virtual services
b. hosted services
c. cloud services
d. volume computing

A

b. hosted services

20
Q

Question # 20

Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?

a. PaaS
b. SDN
c. VDI
d. SaaS

A

c. VDI

21
Q

Question # 21

What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?

(_ _ _)

A

Data Execution Prevention (DEP)