Domain 5 Flashcards

1
Q

RAS installed on a Windows 2000 server can handle how many incoming connections,

A

256–Windows Server can established 256 connections and Windows 2000 Profession can only handle one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol was designed to provide secure connectivity to the Internet over broadband or cable,

A

PoPE–is derived from the PPP protocol and was designed to provide secure connectivity to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Remote Desktop Protocol (RDP) operates at which OSI layer?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Terminal Services Protocol was designated to be able to remotely display and provide interaction with applications running on a Windows computer ,

A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol provides secure client connections over the Internet using VPNs,

A

PPTP–Point to Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Zeroconfig do,

A

Zeroconfig enables sharing of files and resources on the fly between between devices–which con be accomplished over a physical resource like a crossover cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is more secure authentication protocol PAP or CHAP,–(Password Authentication Protocol & Challenge Handshake Authentication Protocol)

A

CHAP–it uses a more complex procedure for authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What supports various authentication methods including Smart Cards, Certificates, Kerberos,

A

EAP–Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T Or F–when using a basic rate ISDN service, you do not need firewalls or other forms of protection,

A

FALSE–the service does not determine the level of security you need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol provides secure, encrypted file transfer between dissimilar systems,

A

SFTP–Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are firewalls primarily used for,

A

Protecting private networks from attacks on the public side and protecting the Internet from attacks on the private side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a security function of a firewall,

A

Restricts unauthorized users from accessing your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are firewalls designed to do,

A

Hide the network behind it–if the hacker cannot see it the network it is difficult to enter the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

name 3 protections for your network from outside invaders,

A

Firewalls, Packet-filtering routers and proxy Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You want to transfer data securely over a WAN. How can this be accomplished,

A

Encrypt data before sending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a secure password,

A

Passwords should be at least 6 characters, a mixture of upper and lower case, non-words and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

3 good security measures for an administrator,

A
  1. never attach a server to the Internet w/o a firewall; Have an attack plan; do not leave any old accounts on network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can you improve password security,

A

Force a password change periodically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you protect your internal network against viruses from the Internet,

A

Network Virus Protection Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virus programs are constantly being modified in order to escape detection. The best defense against is update your________

A

Virus definitions

21
Q

T Or F? Viruses can be transmitted by floppy disk and capable of moving across any pathway that can carry data,

22
Q

When a router is acting as a firewall it can user a technique that monitors all current TEC sessions, what is this called,

A

Stateful Packet Inspection

23
Q

Software that examines your Internet traffic and blocks unapproved content is ______,

A

Content filter

24
Q

T OR F? A network layer firewall uses stateful packet inspection.

25
PPoE is derived from the ____ protocol and was designed to provide secure connectivity to the Internet over broadband Ethernet connections such as DSL
PPP--point to point protocol
26
Name 4 devices that could qualify as encryption devices when configured properly,
VPN concentrator; Router; Sever; and Multilayer switch
27
Name a Web based VPN tunnel that is capable of handling active content,
SSH tunnel VPN--provides additional capabilities such as Java, Active X and Flash
28
What is On-boarding,
Allows devices to quickly be enrolled on a network
29
What as the first thin client allowing remote desktop
ICA--developed by Citrix in the mid 1990s; followed by Microsoft RDP (Independent computing architecture $
30
This cryptographic key allows users to communicate securely using digital certificates--can create or revoke,
PKI--public key infrastructure | PKI--defines a way of verifying the identities users using their unique digital certificates
31
Name the components of AAA security,
Authentication; accounting; authorization
32
802.1x security is based on this authentication method
EAP--Extensible Authentication Protocol
33
T or F? A DDoS attack is generally used to attack a host on the network by attempting to max out its resources from a single location,
False--A DoS is typically a single individual or machine whereas a DDoS uses as many attackers as possible
34
The purpose of marking a building that contains an accessible wireless connection is known as what?
War chalking
35
2 Terms that can be used to define setting up an unauthorized wireless access point set up to eavesdrop
Evil Twin; Rogue AP
36
What could be set up by an authorized wireless network user,
Rogue AP
37
What is the primary function provided by NESSUS,
Vulnerability scanner that scans for vulnerabilities such as misconfiguration, certain Dos
38
NESSUS and NMAP are 2 types of,
Vulnerability Port scanners
39
This term defines a network device set outside the firewall designed to trap and monitor unauthorized access to a network
Honeypot--invisible to the outside
40
what is the main difference between a honeypot and a honeynet
A honey pot is a single device and a honeynet can contain several devices
41
What application has the capability of identifying unencrypted sensitive information on networks, credit card numbers for example,
NESSUS--vulnerability port scanners
42
What has the capability of scanning a large network quickly and providing info about the host,
NMAP--network mapper. Security scanner
43
THE IDS configuration monitors traffic for variations compared to normal traffic based on learned usage patterns,
Behavior-based
44
What would be typically set up by an unauthorized wireless network user,
Evil Twin
45
T or F? In an active man-in-the-middle attack, the attacker usually modifies the traffic before sending,
TRUE
46
T or F? A passive man in the middle attack is known as a replay attack
TRUE
47
This technique is used on devices configured for IDS,
Port mirroring--traffic received forwards on one port on a switch to another
48
Roving around looking for open wireless access points is known as ____________
War driving