Domain 4 Flashcards

1
Q

What connects all devices behind the firewall in a small business network?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following tools can be used to both identify and prevent threats?

A

Anti-malware/antivirus
Intrusion Protection System (IPS)
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the function of transfer switches or transformers in a redundant power system?

A

Enable seamless transition between power sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a scenario requiring full redundancy, what should devices have in terms of power supplies?

A

Two power supplies connected to diverse sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?

A

Demilitarized Zones (DMZ) are a portion of the network which interfaces directly with the outside world and has more security controls and restrictions than its wider IT environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a potential alternative to expensive dedicated point-to-point connections?

A

Gateway-to-gateway VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is network monitoring or sniffing?

A

Monitoring traffic patterns to obtain information about a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the three-way handshake in networking?

A

Synchronizing and acknowledging requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is resource pooling in the context of cloud computing?

A

Sharing physical servers with other organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?

A

Managed Detection and Response (MDR) Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?

A

The NIST definition of cloud computing enjoys widespread global adoption. It outlines a model designed to facilitate pervasive, user-friendly access to a dynamically scalable pool of configurable computing resources, including networks, servers, storage, applications, and services.

These resources can be swiftly provisioned and released with minimal involvement from service providers, representing a significant advancement in ease of management and user interaction, as outlined in NIST Special Publication 800-145.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main purpose of an SLA?

A

To document specific parameters and minimum service levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Application programming interface (API)

A

A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST 800-145

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Community cloud

A

A system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145

17
Q

De-encapsulation

A

The opposite process of encapsulation, in which bundles of data are unpacked or revealed.

18
Q

Why is an abnormal system shutdown in a data center a concern?

A

It may result in the loss or corruption of data

19
Q

Which of the following tools can be used to grant remote users access to the internal IT environment?

A

VPN (virtual private network)

20
Q

What might a user typically need to acknowledge before being allowed to access the internet in a hotel network?

A

Acceptable use policy

21
Q

What distinguishes Memoranda of Understanding (MOU) or Memoranda of Agreement (MOA) from Service Level Agreements (SLA)?

A

MOUs/MOAs are more directly related to what can be done with a system or information, while SLAs specify more intricate aspects of services

22
Q

How are VLANs used in Network Access Control (NAC) systems?

A

VLANs control whether devices connect to the corporate network or a guest network