Chapter 7 Flashcards

Combo: Quiz 7 plus Book End of Chapter Questions

1
Q

Which of the following TCP/IP protocols do not relate to security?

a. IP
b. SNMP
c. HTTPS
d. FTP

A

a. IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aideen sent an email to her supervisor
explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

a. It is fully supported in BIND9.
b. It adds additional resource records.
c. It adds message header information.
d. It can prevent a DNS transfer attack.

A

d. It can prevent a DNS transfer attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the recommended secure protocol for voice and video applications?

a. Secure Real-time Transport Protocol (SRTP)
b. Hypertext Transport Protocol Secure (HTTPS)
c. Network Time Protocol (NTP)
d. Secure/Multipurpose Internet Mail Extensions (S/MIME)

A

a. Secure Real-time Transport Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of log can provide details
regarding requests for specific files on a system?

a. Audit log
b. Event log
c. Access log
d. SysFile log

A

b. Event log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of device log contains the most beneficial security data?

a. Firewall log
b. Email log
c. Switch log
d. Router log

A

a. Firewall log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of cloud is offered to specific organizations that have common concerns?

a. Public cloud
b. Hybrid cloud
c. Private cloud
d. Community cloud

A

d. Community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of these is NOT correct about an SSL accelerator?

a. It can be a separate hardware card that inserts into a web server.
b. It can be a separate hardware module.
c. It should reside between the user’s device and the web servers.
d. It can only handle the SSL protocol.

A

d. It can only handle the SSL protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?

a. Network tap
b. Port mirroring
c. Aggregation switch
d. Correlation engine

A

b. Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which version of Simple Network Management Protocol (SNMP) is considered the most secure?

a. SNMPv2
b. SNMPv3
c. SNMPv4
d. SNMPv5

A

b. SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?

a. DNS replay
b. DNS masking
c. DNS poisoning
d. DNS forwarding

A

c. DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is the most secure protocol for transferring files?

a. FTPS
b. SFTP
c. TCP
d. FTP

A

c. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following can be used to prevent a buffer overflow attack?

a. DEP
b. FIM
c. VPN
d. DNS

A

a. DEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT a service
model in cloud computing?

a. Software as a Service (SaaS)
b. Hardware as a Service (HaaS)
c. Platform as a Service (PaaS)
d. Infrastructure as a Service (IaaS)

A

b. Hardware as a Service (HaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?

a. Suspicious outbound connections
b. IP addresses that are being rejected and dropped
c. Successful logins
d. IP addresses that are being rejected and dropped

A

c. Successful logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of hypervisor does not run
on an underlying operating system?

a. Type I
b. Type II
c. Type III
d. Type IV

A

a. Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which application stores the user’s
desktop inside a virtual machine that resides on a server and is accessible from multiple locations?

a. Application cell
b. Container
c. VDE
d. VDI

A

d. VDI

17
Q

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

a. Virtual services
b. Off-premises
c. On-premises
d. Hosted services

A

c. On-premises

18
Q

DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.

a. resource records
b. field flags
c. hash sequences
d. zone transfers

A

a. resource records

19
Q

What functions of a switch does a software defined network separate?

a. Host and virtual
b. Control plane and physical plane
c. RAM and hard drive
d. Network level and resource level

A

b. Control plane and physical plane

20
Q

Which of the following is NOT a security
concern of virtualized environments?

a. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer.
b. Physical security appliances are not always designed to protect virtual systems.
c. Virtual servers are less expensive than their physical counterparts.
d. Live migration can immediately move one virtualized server to another hypervisor.

A

c. Virtual servers are less expensive than their physical counterparts.

21
Q

At what level of the OSI model does the IP protocl function?

a) Transport Layer
b) Network layer
c) Presentation Layer
d) Data link layer

A

b) Network layer

22
Q

Which of the following protocols is unsecured?

a) HTTPS
b) TLS
c) FTP
d) SSL

A

c) FTP

23
Q

File integrity check (FIC) is a service that can monitor any changes made to computer files, such as operating systems files.

(T/F)

A

True

24
Q

Which cloud computing service model uses the cloud computing vendor to provide access to the vendor’s software applications running on a cloud infrastructure?

a) system as a service
b) infrastructure as a service
c) software as a service
d) application as a service

A

c) software as a service

25
Q

A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.

(T/F)

A

False

26
Q

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

a) hub
b) router
c) switch
d) bridge

A

b) router

27
Q

Trivial File Transfer Protocol (TFTP) uses a more money memory when compared to FTP.

(T/F)

A

False

28
Q

Select the email protocols that are not secure? (choose all that apply)

a) S/MIME
b) TLS
c) IMAP
d) POP

A

c) IMAP
d) POP

29
Q

What secore protocol is recommended for voice and video?

a) SRTP
b) IPsec
c) IMAP
d) S/MIME

A

a) SRTP