Module G4 PE - Protecting Networks Flashcards

1
Q

A smart card reader and token are examples of?

A

logical device access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is the most critical layer of the Cisco Three Layer Model?

A

core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAAA will return a _____ bit IPv6 address.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When policies and procedures are put in place by an organization to prevent users access to information, this is called?

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which server will receive an initial DNS query?

A

recursor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control is managed at what layer?

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What helps prevent IP address data being provided to other network devices?

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protects the integrity of computer networks?

A

network protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which server resolves the domain name into the IP address?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which type of port security mode will a syslog message be sent?

A

restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is important with switching traffic at the core level?

A

speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a layer 2 device that is very vulnerable to attacks?

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the #1 cause of security breaches?

A

human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In security levels, which level uses network sniffers or IDS/IPS?

A

network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For DNS lookup what will return a 32 bit IP address?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Effective network-level security incorporates _________ and intrusion detection and prevention systems.

A

firewalls