Module G4: Protecting Networks (PE) Flashcards

1
Q

A smart card reader and token are examples of?

A

logical device access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is the most critical layer of the Cisco Three Layer Model?

A

core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AAAA will return a _____ bit IPv6 address.

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When policies and procedures are put in place by an organization to prevent users access to information, this is called?

A

administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which server will receive an initial DNS query?

A

recursor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access control is managed at what layer?

A

access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What helps prevent IP address data being provided to other network devices?

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protects the integrity of computer networks?

A

network protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which server resolves the domain name into the IP address?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which type of port security mode will a syslog message be sent?

A

restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is important with switching traffic at the core level?

A

speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a layer 2 device that is very vulnerable to attacks?

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the #1 cause of security breaches?

A

human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In security levels, which level uses network sniffers or IDS/IPS?

A

network level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For DNS lookup what will return a 32 bit IP address?

A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Effective network-level security incorporates _________ and intrusion detection and prevention systems.

A

firewalls

17
Q

What must be in place at the core level?

A

redundancy

18
Q

Which server returns the requested host?

A

authoritative nameserver

19
Q

What is one of the first things you should change for router security?

A

hostname

20
Q

What is the preferred model for network design?

A

three layer model

21
Q

Ensuring employees only have access to data required for their job is what type of control?

A

Administrative control

22
Q

Which server locates the last portion of an address?

A

TLD Name Server

23
Q

In which type of port security mode will the port be shut down?

A

shutdown

24
Q

In security layers at which layer is secure coding put into practice?

A

application layer security

25
Q

What was the most expensive cyber attack to date?

A

Epsilon

26
Q

Which type of DNS query will return a referral to a DNS server of a lower level if it does not have a match?

A

iterative

27
Q

Port security happens at what layer?

A

access

28
Q

In security layers which layer uses encryption and user access?

A

data layer security

29
Q

How many servers are included in DNS protocol?

A

4

30
Q

What is a common thing to use to display legal information?

A

banner login

31
Q

CCTV would be what type of control?

A

physical control

32
Q

Which type of DNS query will return an error message if it can’t find the record?

A

recursive

*slide 31

33
Q

If a host needs access to reach another network, what layer handles that?

A

Distribution

34
Q

In which type of port security mode will no notification be sent?

A

Protect

*slide 25

35
Q

How many types of DNS queries are there?

A

3

*slide 31

36
Q

Ensuring accounts are removed after an employee leaves the company is what type of control?

A

administrative

37
Q

Cyber criminals attack every ________ seconds?

A

39

38
Q

Two factor authentication is what type of control?

A

technical

39
Q

What protects digital assets with several layers?

A

layered security