Domain 5 Flashcards

1
Q

RAS installed on a Windows 2000 server can handle how many incoming connections,

A

256–Windows Server can established 256 connections and Windows 2000 Profession can only handle one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol was designed to provide secure connectivity to the Internet over broadband or cable,

A

PoPE–is derived from the PPP protocol and was designed to provide secure connectivity to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Remote Desktop Protocol (RDP) operates at which OSI layer?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Terminal Services Protocol was designated to be able to remotely display and provide interaction with applications running on a Windows computer ,

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol provides secure client connections over the Internet using VPNs,

A

PPTP–Point to Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Zeroconfig do,

A

Zeroconfig enables sharing of files and resources on the fly between between devices–which con be accomplished over a physical resource like a crossover cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is more secure authentication protocol PAP or CHAP,–(Password Authentication Protocol & Challenge Handshake Authentication Protocol)

A

CHAP–it uses a more complex procedure for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What supports various authentication methods including Smart Cards, Certificates, Kerberos,

A

EAP–Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T Or F–when using a basic rate ISDN service, you do not need firewalls or other forms of protection,

A

FALSE–the service does not determine the level of security you need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol provides secure, encrypted file transfer between dissimilar systems,

A

SFTP–Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are firewalls primarily used for,

A

Protecting private networks from attacks on the public side and protecting the Internet from attacks on the private side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security function of a firewall,

A

Restricts unauthorized users from accessing your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are firewalls designed to do,

A

Hide the network behind it–if the hacker cannot see it the network it is difficult to enter the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

name 3 protections for your network from outside invaders,

A

Firewalls, Packet-filtering routers and proxy Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You want to transfer data securely over a WAN. How can this be accomplished,

A

Encrypt data before sending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a secure password,

A

Passwords should be at least 6 characters, a mixture of upper and lower case, non-words and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3 good security measures for an administrator,

A
  1. never attach a server to the Internet w/o a firewall; Have an attack plan; do not leave any old accounts on network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can you improve password security,

A

Force a password change periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you protect your internal network against viruses from the Internet,

A

Network Virus Protection Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virus programs are constantly being modified in order to escape detection. The best defense against is update your________

A

Virus definitions

21
Q

T Or F? Viruses can be transmitted by floppy disk and capable of moving across any pathway that can carry data,

A

TRUE

22
Q

When a router is acting as a firewall it can user a technique that monitors all current TEC sessions, what is this called,

A

Stateful Packet Inspection

23
Q

Software that examines your Internet traffic and blocks unapproved content is ______,

A

Content filter

24
Q

T OR F? A network layer firewall uses stateful packet inspection.

A

FALSE

25
Q

PPoE is derived from the ____ protocol and was designed to provide secure connectivity to the Internet over broadband Ethernet connections such as DSL

A

PPP–point to point protocol

26
Q

Name 4 devices that could qualify as encryption devices when configured properly,

A

VPN concentrator; Router; Sever; and Multilayer switch

27
Q

Name a Web based VPN tunnel that is capable of handling active content,

A

SSH tunnel VPN–provides additional capabilities such as Java, Active X and Flash

28
Q

What is On-boarding,

A

Allows devices to quickly be enrolled on a network

29
Q

What as the first thin client allowing remote desktop

A

ICA–developed by Citrix in the mid 1990s; followed by Microsoft RDP

(Independent computing architecture $

30
Q

This cryptographic key allows users to communicate securely using digital certificates–can create or revoke,

A

PKI–public key infrastructure

PKI–defines a way of verifying the identities users using their unique digital certificates

31
Q

Name the components of AAA security,

A

Authentication; accounting; authorization

32
Q

802.1x security is based on this authentication method

A

EAP–Extensible Authentication Protocol

33
Q

T or F? A DDoS attack is generally used to attack a host on the network by attempting to max out its resources from a single location,

A

False–A DoS is typically a single individual or machine whereas a DDoS uses as many attackers as possible

34
Q

The purpose of marking a building that contains an accessible wireless connection is known as what?

A

War chalking

35
Q

2 Terms that can be used to define setting up an unauthorized wireless access point set up to eavesdrop

A

Evil Twin; Rogue AP

36
Q

What could be set up by an authorized wireless network user,

A

Rogue AP

37
Q

What is the primary function provided by NESSUS,

A

Vulnerability scanner that scans for vulnerabilities such as misconfiguration, certain Dos

38
Q

NESSUS and NMAP are 2 types of,

A

Vulnerability Port scanners

39
Q

This term defines a network device set outside the firewall designed to trap and monitor unauthorized access to a network

A

Honeypot–invisible to the outside

40
Q

what is the main difference between a honeypot and a honeynet

A

A honey pot is a single device and a honeynet can contain several devices

41
Q

What application has the capability of identifying unencrypted sensitive information on networks, credit card numbers for example,

A

NESSUS–vulnerability port scanners

42
Q

What has the capability of scanning a large network quickly and providing info about the host,

A

NMAP–network mapper. Security scanner

43
Q

THE IDS configuration monitors traffic for variations compared to normal traffic based on learned usage patterns,

A

Behavior-based

44
Q

What would be typically set up by an unauthorized wireless network user,

A

Evil Twin

45
Q

T or F? In an active man-in-the-middle attack, the attacker usually modifies the traffic before sending,

A

TRUE

46
Q

T or F? A passive man in the middle attack is known as a replay attack

A

TRUE

47
Q

This technique is used on devices configured for IDS,

A

Port mirroring–traffic received forwards on one port on a switch to another

48
Q

Roving around looking for open wireless access points is known as ____________

A

War driving