Chapter 10 Flashcards

1
Q

At what layer of the OSI model do proxy servers operate?

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

A

access-list acl_2 permit http any any

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of firewall blocks traffic based on application data contained within the packets?

A

Content-filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

A

Application awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What software might be installed on a device in order to authenticate it to the network?

A

Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

A

Access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What feature of Windows Server allows for agentless authentication?

A

AD (active directory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

A

switchport port-security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

A

LDAP (Lightweight Directory Access Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two primary features that give proxy servers an advantage over NAT?

A

Content filtering

File caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What kinds of issues might indicate a misconfigured ACL?

A

Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others can’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any traffic that is not explicitly permitted in the ACL is denied, which is called the

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the essential difference between an IPS and an IDS?

A

An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What causes most firewall failures?

A

Firewall miconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is a BPDU filter needed at the demarc?

A

The ISP’s STP-related topology information shouldn’t be mixed with a corporate network’s STP-related topology information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do network administrators create domain groups to manage user security privileges?

A

To simplify the process of granting rights to users

17
Q

Only one ___________________ exists on a network using STP

A

Root bridge

18
Q

What kind of ticket is held by Kerberos’ TGS?

A

TGT (Ticket-Granting Ticket)

19
Q

EAPoL is primarily used with what kind of transmission?

20
Q

___________ (abbreviation) is a security strategy that combines multiple layers of security appliances and technologies into a single safety net.

A

UTM (Unified Threat Management)

21
Q

_______ (abbreviation) monitors network traffic and alerts (only) about suspicious activity.

A

IDS (Intrusion Detection System)

22
Q

can detect suspicious activity and block it from entering the network or the host

A

IPS (Intrusion Prevention System)

23
Q

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

24
Q

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.