Chapter 07 Quiz – Administering a Secure Network Flashcards
Questions 21
Question # 01
TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.
a. True
b. False
a. True
Question # 02
S/MIME can be used when mail is accessed through a web browser.
a. True
b. False
b. False
Question # 03
A correlation engine aggregates and correlates content from different sources to uncover an attack.
a. True
b. False
a. True
Question # 04
Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?
a. Application Layer
b. Presentation Layer
c. Network Layer
d. Transport Layer
d. Transport Layer
Question # 05
DNS poisoning can be prevented using the latest edition of what software below?
a. BIND
b. DHCP
c. WINS
d. finger
a. BIND
Question # 06
An administrator needs to examine FTP commands that are being passed to a server.
What port should the administrator be monitoring?
a. 19
b. 20
c. 21
d. 22
c. 21
Question # 07
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor’s software applications running on a cloud infrastructure?
a. Application as a Service
b. Infrastructure as a Service
c. Software as a Service
d. System as a Service
c. Software as a Service
Question # 08
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?
a. TCP/IP
b. FTP
c. SNMP
d. SRTP
c. SNMP
Question # 09
Which of the following protocols is unsecured?
a. HTTPS
b. TLS
c. SSL
d. FTP
d. FTP
Question # 10
What secure protocol is recommended for time synchronization?
a. SRTP
b. S/MIME
c. NTP
d. POP
c. NTP
Question # 11
What secure protocol is recommended for voice and video?
a. SRTP
b. S/MIME
c. IMAP
d. IPsec
a. SRTP
Question # 12
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
a. interface capture
b. port identity
c. port snooping
d. port mirroring
d. port mirroring
Question # 13
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
a. network tap
b. network mirror
c. shark box
d. shark tap
a. network tap
Question # 14
What type of switch is used to combine multiple network connections into a single link?
a. core switch
b. gateway switch
c. aggregation switch
d. access switch
c. aggregation switch
Question # 15
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
a. malware management
b. inventory permissions
c. application whitelist
d. application control
c. application whitelist