Other Questions Flashcards

1
Q

Which of the following answers refer to the implementations of NAC? (Select 2 answers)

A

MAC filter

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company’s security policy requires all employee devices to have a software installed that would run as a background service on each device and perform host security health checks before granting/denying it access to the corporate intranet. Based on the given description, which of the answers listed below can be used to describe the software’s features? (Select 2 answers)

A

Agent-based

Permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of device would be the most convenient for interconnecting two or more physically separated network segments?

A

Wireless bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An SSL decryptor card is a type of dedicated hardware device that improves performance of a server by taking over computational tasks related to handling of encrypted network traffic.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A type of device that translates data between different communication formats is called:

A

Media gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a CLI packet sniffer?

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a TCP port used by FTP for session control?

21

A

An FTP data transfer connection is established through a TCP port number:

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the port numbers listed below are used by FTP over TLS/SSL (FTPS)? (Select 2 answers)

989
990

A

Secure Copy (SCP) runs by default on port 22

Secure File Transfer Protocol (SFTP) runs by default on port 22

Secure Shell (SSH) runs by default on port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamic Host Configuration Protocol (DHCP) runs on:

UDP port 67
UDP port 68

A

What are the characteristic features of IMAPS? (Select all that apply)

Secure Sockets Layer (SSL)
TCP port 993
Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which protocols use port 500? (Select 2 answers)

IKE
ISAKMP

A

Port 1701 is used by:

L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP port 389 is the default network port for:

LDAP

A

A network administrator has been asked to secure directory service access with an SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change?

636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refer(s) to POP3S encrypted communication?

Secure Sockets Layer (SSL)
TCP port 995
Transport Layer Security (TLS)

A

Point-to-Point Tunneling Protocol (PPTP) runs on TCP port 1723

Port 1701 is used by Layer 2 Forwarding Protocol (L2F) and Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the ports listed below are used by RADIUS?

1812
1813

A

Unblocking port number 22 enables what type of traffic?

SSH
SFTP
SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following ports are assigned to the Session Initiation Protocol (SIP)?

5060
5061

A

An SNMP management station receives SNMP notifications from Agents on UDP port: 162

An SNMP Agent receives requests on UDP port: 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TACACS+ runs on TCP port:

49

A

Trivial File Transfer Protocol (TFTP) uses:

UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A pharming attack is another type of attack that manipulates the DNS name resolution process. It either tries to corrupt the DNS server or the DNS client.

A

many existing applications still use NTLM, so it can still be enabled on many Windows systems for backward compatibility.

17
Q

Many protocols use timestamps and sequence numbers to thwart replay attacks. For example, Kerberos, covered in Chapter 2, helps prevent replay attacks with timestamped tickets.

A

End