Chapter 7 Flashcards
Combo: Quiz 7 plus Book End of Chapter Questions
Which of the following TCP/IP protocols do not relate to security?
a. IP
b. SNMP
c. HTTPS
d. FTP
a. IP
Aideen sent an email to her supervisor
explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?
a. It is fully supported in BIND9.
b. It adds additional resource records.
c. It adds message header information.
d. It can prevent a DNS transfer attack.
d. It can prevent a DNS transfer attack.
What is the recommended secure protocol for voice and video applications?
a. Secure Real-time Transport Protocol (SRTP)
b. Hypertext Transport Protocol Secure (HTTPS)
c. Network Time Protocol (NTP)
d. Secure/Multipurpose Internet Mail Extensions (S/MIME)
a. Secure Real-time Transport Protocol (SRTP)
Which type of log can provide details
regarding requests for specific files on a system?
a. Audit log
b. Event log
c. Access log
d. SysFile log
b. Event log
Which type of device log contains the most beneficial security data?
a. Firewall log
b. Email log
c. Switch log
d. Router log
a. Firewall log
Which type of cloud is offered to specific organizations that have common concerns?
a. Public cloud
b. Hybrid cloud
c. Private cloud
d. Community cloud
d. Community cloud
Which of these is NOT correct about an SSL accelerator?
a. It can be a separate hardware card that inserts into a web server.
b. It can be a separate hardware module.
c. It should reside between the user’s device and the web servers.
d. It can only handle the SSL protocol.
d. It can only handle the SSL protocol.
Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?
a. Network tap
b. Port mirroring
c. Aggregation switch
d. Correlation engine
b. Port mirroring
Which version of Simple Network Management Protocol (SNMP) is considered the most secure?
a. SNMPv2
b. SNMPv3
c. SNMPv4
d. SNMPv5
b. SNMPv3
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?
a. DNS replay
b. DNS masking
c. DNS poisoning
d. DNS forwarding
c. DNS poisoning
Which of these is the most secure protocol for transferring files?
a. FTPS
b. SFTP
c. TCP
d. FTP
c. TCP
Which of the following can be used to prevent a buffer overflow attack?
a. DEP
b. FIM
c. VPN
d. DNS
a. DEP
Which of the following is NOT a service
model in cloud computing?
a. Software as a Service (SaaS)
b. Hardware as a Service (HaaS)
c. Platform as a Service (PaaS)
d. Infrastructure as a Service (IaaS)
b. Hardware as a Service (HaaS)
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?
a. Suspicious outbound connections
b. IP addresses that are being rejected and dropped
c. Successful logins
d. IP addresses that are being rejected and dropped
c. Successful logins
Which type of hypervisor does not run
on an underlying operating system?
a. Type I
b. Type II
c. Type III
d. Type IV
a. Type I