Security fundamentals Flashcards
Protects infrastructure locations such as network closets
- user awareness
- physical access control
- user training
- physical access control
provides employees with information about protecting confidential data
- user awareness
- physical access control
- user training
- user awareness
familiarizes users with corporate security policies in a formal and mandatory fashion
- user awareness
- physical access control
- user training
- user training
(Port security - unauthorized MAC)
You want to configure a switch to discard traffic and increment the security violations counter when it receives traffic from a host with an unauthorized MAC address.
What command would accomplish this?
Restrict
protect
shutdown
Switchport port-security violation restrict
(Port security - unauthorized MAC)
You want to configure a switch to discard traffic but doesn’t increment the security violations counter when it receives traffic from a host with an unauthorized MAC address.
What command would accomplish this?
Restrict
protect
shutdown
Switchport port-security violation protect
(Port security - unauthorized MAC)
You want to configure a switch port to enter the err-disabled stated when it receives an unauthorized MAC address.
What command would accomplish this?
Restrict
protect
shutdown
Switchport port-security violation shutdown
NOTE: To bring the port back up you can issue the (errdisable recovery cause shutdown) command or issue the shutdown, no shutdown command.
(choose 2)
which of the following are provided by IPSec?
- boradcast packet encapsulation
- multicast packet encapsulation
- data integrity
- data confidentiality
- data integrity
- data confidentiality
Which of the following are most likely considered forms of authorization?
A. Assigning a role to a verified used
B. Logging a verified user file access
C. Verifying a users password
D. Allowing a user to access a specific file
E. Verifying a users fingerprint pattern
A. Assigning a role to a verified used
D. Allowing a user to access a specific file