Module G4: Protecting Networks (PE) Flashcards
A smart card reader and token are examples of?
logical device access
Which is the most critical layer of the Cisco Three Layer Model?
core
AAAA will return a _____ bit IPv6 address.
128
When policies and procedures are put in place by an organization to prevent users access to information, this is called?
administrative controls
Which server will receive an initial DNS query?
recursor
Access control is managed at what layer?
access
What helps prevent IP address data being provided to other network devices?
DHCP snooping
What protects the integrity of computer networks?
network protection
Which server resolves the domain name into the IP address?
In which type of port security mode will a syslog message be sent?
restrict
What is important with switching traffic at the core level?
speed
What is a layer 2 device that is very vulnerable to attacks?
switch
What is the #1 cause of security breaches?
human error
In security levels, which level uses network sniffers or IDS/IPS?
network level
For DNS lookup what will return a 32 bit IP address?
a
Effective network-level security incorporates _________ and intrusion detection and prevention systems.
firewalls
What must be in place at the core level?
redundancy
Which server returns the requested host?
authoritative nameserver
What is one of the first things you should change for router security?
hostname
What is the preferred model for network design?
three layer model
Ensuring employees only have access to data required for their job is what type of control?
Administrative control
Which server locates the last portion of an address?
TLD Name Server
In which type of port security mode will the port be shut down?
shutdown
In security layers at which layer is secure coding put into practice?
application layer security
What was the most expensive cyber attack to date?
Epsilon
Which type of DNS query will return a referral to a DNS server of a lower level if it does not have a match?
iterative
Port security happens at what layer?
access
In security layers which layer uses encryption and user access?
data layer security
How many servers are included in DNS protocol?
4
What is a common thing to use to display legal information?
banner login
CCTV would be what type of control?
physical control
Which type of DNS query will return an error message if it can’t find the record?
recursive
*slide 31
If a host needs access to reach another network, what layer handles that?
Distribution
In which type of port security mode will no notification be sent?
Protect
*slide 25
How many types of DNS queries are there?
3
*slide 31
Ensuring accounts are removed after an employee leaves the company is what type of control?
administrative
Cyber criminals attack every ________ seconds?
39
Two factor authentication is what type of control?
technical
What protects digital assets with several layers?
layered security