Formative 2 Flashcards

1
Q

Which service will resolve a specific web address into an IP Address of the destination web server?

DHCP

NTP

DNS

ICMP

A

Domain Name Server (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A user was hired by a company to provide a highly available network infrastructure. The userr wants to build redundancy into the network in case of a switch failure, but wants to prevent Layer II looping. What would the user implement in the network?

VRRP

GLBP

Spanning Tree Protocol

HSRP

A

Spanning Tree Protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two steps should be taken before connecting any IoT device to a home or business network? (Choose two(2)).

Record the administrative credentials on the login plate in case you forget them.

Update the device firmware with all relevant security patches.

Reset all IoT device settings to their defaults before connecting to a live network.

Change all default administrator credentials.

A

Update the device firmware with all relevant seucirty patches.

Change all default adminstrator credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mutual authentication can prevent which type of attack?

man-in-the-middle

wireless IP spoofing

wireless poisoning

wireless sniffing

A

Man-in-the-middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers. Which protocol would be best to use?

Secure Shell

Secure Copy

Telnet

Remote Desktop

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is WPA2 better than WPA?

supports TKIP

reduced processing time

reduced keyspace

mandatory use of AES algorithms

A

Mandatory use of AES algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of a DMZ?

It provides secure connectivity for clients that connect to the internal network through a wireless LAN.

It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.

It analyzes traffic for intrusion attempts and sends reports to management stations.

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

A

It allows external hosts to access specific company servers while maintining the security restrictions for the internal network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which technology can be used to protect Volp against eavesdropping?

SSH

ARP

strong authentication

encrypted voice messages

A

Encrypted voice messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which utilitiy uses the Internet Control Messaging Protocol (ICMP)

RIP

DNS

NTP

ping

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user is running a routine audit of the server hardware in the company data center. Several servers are using single drivers to host operating systems and multiple types of attached storage solutions for storing data. The user wants to offer a better solution to provide fault tolerance during a driver failure. Which solution is best?

offsite backup

RAID

tape backup

UPS

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user has created a new program and wants to distribute it to everyone in the company. THe users wnats to ensure that when the program is downloaded that the program is not changed while in transit. When can be the user do to ensure that the program is not changed when downloaded?

Distribute the program on a thumb drive.

Install the program on individual computers

Turn off antivirus on all the computers.

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

A

Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?

Type I

Type II

false rejection

CER

A

Type I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An access badge allows an individual to gain access to an area with automated entry points. @Apollo wants all of employees to have access badges but needs to design the card reader system. (Piece them together)

The computer makes access control based on the credential provided

The system sends the number to a computer

An access badge is swiped

The system logs details of this transaction for retrieval

The card reader reads a number on the access badge

A

An access badge is swiped.

The card reader reads a number on the access badge.

The system sends the number to a computer.

The computer makes access control based on the credential provided.

The system logs details of this transaction for retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Measures data consistency by taking a snapshot at an instant in time to ensure it remains unchaged.

Integrity Checks

Secure Cookies

Validation Rules

Code Signing

A

integrity Checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Stores data securely for future requests while you are browsing a website

Integrity Checks

Secure Cookies

Validation Rules

Code Signing

A

Secure cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Checks that data fails within predefined parameters to ensure the completeness, accuracy and consistency of data

Integrity Checks

Secure Cookies

Validation Rules

Code Signing

A

Validation Rules

17
Q

Digitally validates that software code has not changed and is authentic.

Integrity Checks

Secure Cookies

Validation Rules

Code Signing

A

Code Signing