Formative 2 Flashcards
Which service will resolve a specific web address into an IP Address of the destination web server?
DHCP
NTP
DNS
ICMP
Domain Name Server (DNS)
A user was hired by a company to provide a highly available network infrastructure. The userr wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer II looping. What would the user implement in the network?
VRRP
GLBP
Spanning Tree Protocol
HSRP
Spanning Tree Protocol (STP)
What two steps should be taken before connecting any IoT device to a home or business network? (Choose two(2)).
Record the administrative credentials on the login plate in case you forget them.
Update the device firmware with all relevant security patches.
Reset all IoT device settings to their defaults before connecting to a live network.
Change all default administrator credentials.
Update the device firmware with all relevant seucirty patches.
Change all default adminstrator credentials.
Mutual authentication can prevent which type of attack?
man-in-the-middle
wireless IP spoofing
wireless poisoning
wireless sniffing
Man-in-the-middle (MITM)
An administrator of a small data center wants a flexible, secure method of remotely connecting to servers. Which protocol would be best to use?
Secure Shell
Secure Copy
Telnet
Remote Desktop
Secure Shell (SSH)
Why is WPA2 better than WPA?
supports TKIP
reduced processing time
reduced keyspace
mandatory use of AES algorithms
Mandatory use of AES algorithms.
What is the purpose of a DMZ?
It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
It analyzes traffic for intrusion attempts and sends reports to management stations.
It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
It allows external hosts to access specific company servers while maintining the security restrictions for the internal network.
Which technology can be used to protect Volp against eavesdropping?
SSH
ARP
strong authentication
encrypted voice messages
Encrypted voice messages
Which utilitiy uses the Internet Control Messaging Protocol (ICMP)
RIP
DNS
NTP
ping
ping
A user is running a routine audit of the server hardware in the company data center. Several servers are using single drivers to host operating systems and multiple types of attached storage solutions for storing data. The user wants to offer a better solution to provide fault tolerance during a driver failure. Which solution is best?
offsite backup
RAID
tape backup
UPS
RAID
A user has created a new program and wants to distribute it to everyone in the company. THe users wnats to ensure that when the program is downloaded that the program is not changed while in transit. When can be the user do to ensure that the program is not changed when downloaded?
Distribute the program on a thumb drive.
Install the program on individual computers
Turn off antivirus on all the computers.
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.
A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?
Type I
Type II
false rejection
CER
Type I
An access badge allows an individual to gain access to an area with automated entry points. @Apollo wants all of employees to have access badges but needs to design the card reader system. (Piece them together)
The computer makes access control based on the credential provided
The system sends the number to a computer
An access badge is swiped
The system logs details of this transaction for retrieval
The card reader reads a number on the access badge
An access badge is swiped.
The card reader reads a number on the access badge.
The system sends the number to a computer.
The computer makes access control based on the credential provided.
The system logs details of this transaction for retrieval.
Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchaged.
Integrity Checks
Secure Cookies
Validation Rules
Code Signing
integrity Checks
Stores data securely for future requests while you are browsing a website
Integrity Checks
Secure Cookies
Validation Rules
Code Signing
Secure cookies