Domain 4: Review Questions Flashcards
Which motion detection system has a reflective panel to create zones of detection?
A. Microwave
B. Vibration
C. Passive infrared (PIR)
D. Seismic
C. Passive infrared (PIR)
You need to deply a surveillance camera in an area that requires you to record the equipment the entire time it has entered you datacenter to the time it is installed. Which type of surveillance camera should you deploy?
A. CCTV
B. PTZ
C. Coaxial
D. POE
B. PTZ
You work for a library and require an asset tracking system that is inexpensive and will notify you when equipment leaves the building. Which type of system should you purchase and deploy?
A. Bluetooth
B. Passive RFID
C. 802.11 asset tracking
D. Active RFID
B. Passive RFID
You require a physical security system that authenticates and authorizes employees into an area. Which system should you implement?
A. Key fobs
B. ID badges
C. Biometrics
D. Combination locks
C. Biometrics
Which is a physical authentication system that requires both a personal identification number (PIN) and physical card?
A. Key fobs
B. Biometrics
C. RFID
D. Smart cards
D. Smart cards
Which principle describes the process of verification of a user’s identity?
A. Authentication
B. Aurhorization
C. Accounting
D. Auditing
A. Authentication
Which authentication system is an open standard originally proposed by the Internet Engineer Task Force (IETF)?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
A. RADIUS
Which authentication system can use Advanced Encryption Standard (AES) encryption for encryption of user credentials?
A. RADIUS
B. TACACS+
C. Kerberos
D. LDAP
C. Kerberos
Which protocol is often used with single sign-on (SSO) to exchange credentials?
A. LDAP
B. SAML
C. ADFS
D. Kerberos
B. SAML
Which principle describes the process of verification of a user’s permissions?
A. Authentication
B. Authorization
C. Accounting
D. Auditing
B. Authorization
What protocol and port number does LDAP use for directory lookups?
A. TCP/389
B. TCP/1812
C. UDP/389
D. UDP/1812
A. TCP/389
Which authentication factor is an example of personal human characteristic?
A. Typing your password
B. A location you are in
C. A smartcard and you PIN
D. Your voice
D. Your voice
Which authentication factor is an example of somewhere you are?
A. Your IP address
B. An RFID tag
C. Your MAC address
D. Your picture
A. Your IP address
Which Cisco proprietary protocol is used to transmit credentials for 802.1x authentication systems?
A. LEAP
B. EAP
C. PEAP
D. NAC
A. LEAP
What is the proper terminology for a switch or wireless access point (WAP), when 802.1x is implemented?
A. Authenticating server
B. Authenticator
C. Supplicant
D. Authorizer
B. Authenticator
You need to restrict a switch port to a maximum of two devices. What should you implement to gaurantee only two devices can communicate on the switch port?
A. NAC
B. 802.1x
C. ACLs
D. Port security
D. Port security
You are implementing a public guest wireless network and require that users accept and aceptable use policy (AUP). What should you implement to accomplish the goal?
A. ACLs
B. MAC filtering
C. Captive portal
D. 802.1x
C. Captive portal
Which wireless protocol introduced message integrity checks (MIC) and Temporal Key Integrity Protocol (TKIP)?
A. WPA
B. WEP
C. WPA2
D. CBC
A. WPA
You are implementing a wireless network and need to make sure that only hosts that have up-to-date antivirus protection can join. Which technology should you implement?
A. NAC
B. 802.1x
C. EAP-TLS
D. ACLs
A. NAC
Which network attack involves malicious code that is dormant until specific conditions are met?
A. Evil twin
B. Logic bomb
C. Spoofing
D. Deauthentication
B. Logic bomb
Which statement accurately describes an exploit?
A. A known weakness in the operating system
B. A configuration that weakens the security of the operating system
C. A known operating system security flaw
D. A technique to gain unauthorized access
D. A technique to gain unauthorized access
Which algorithm is commonly used with file hash techniques?
A. RC4
B. MD5
C. HMAC
D. AES
B. MD5
Which attack involves the attacker impersonating both side of a conversation between two hosts?
A. MitM
B. Deauthentication
C. DoS
D. Spoofing
A. MitM
Which console-based management protocol has built-in security?
A. SSH
B. SCP
C. HTTPS
D. FTP
A. SSH
Which mitigation technique is configured on user-facing switch ports to protect the Spanning Tree Protocol (STP)?
A. Flood guard
B. Root Guard
C. DHCP snooping
D. BPDU Guard
D. BPDU Guard