CND2 Flashcards
What number indicates a router advertisement?
9
What passes empty frames across the network so that the computers ready to send information to any other computer can insert data into the frame including the destination identifier?
Token Ring
What layer in TCP/IP performs modulation, bit and frame synchronization, and error detection?
Network Access Layer
In classful IP addressing, the router uses what octet to determine address class?
1st octet
What IP class is referred to as 16/s
B
What configuration vulnerability exists due to the misconfiguration of computing and network devices?
Default password and settings
Improper password management vulnerability comes under which type of network security vulnerability?
Configuration Vulnerabilities
What type of encryption do digital certificates use?
Asymmetric
What is a limitation of hashing?
Fixed length string?
What is a thumbprint on a Digital Certificate?
Specifies the hash value for the certificate, verifies the certificate’s integrity
What protocol provides centralized authentication, authorization, and accounting for remote access servers to communicate with a central server?
RADIUS
Which of the following is a network security protocol used for authentication, authorization, and accounting for a network device like switches, routers and firewalls through one or more centralized servers?
TACACS+
What security requirement refers to the need of security for various components of IS - computers, networks, etc
Discipline Security
What security requirement refers to the compliance requirement with various standards
Assurance Security
Which part of a security policy implementation focuses on security disciplines, safeguards, procedures, and more?
Policy Description
What does security concept of operation do?
Defines roles and responsibilities
What are the responsibilities of a network admin while configuring the firewall security policies?
- Authentication of service or application
2. Enable anti-spoofing protection
What policy defines the guidelines for processing, storing, and transmitting sensitive information?
Information Protection Policy
What does user account policy not define
Remote Access
What ISO standard addresses cybersecurity?
ISO/IEC 27032
What does ISO/IEC 27033-1 to -5 address?
Network Security
What ISO standard covers customer privacy?
ISO/IEC 27018
What ISO is known as ‘security metrics’?
ISO/IEC 27004
What ISO defines ‘information security controls’?
ISO/IEC 27002