Security fundamentals Flashcards

1
Q

Protects infrastructure locations such as network closets

  1. user awareness
  2. physical access control
  3. user training
A
  1. physical access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

provides employees with information about protecting confidential data

  1. user awareness
  2. physical access control
  3. user training
A
  1. user awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

familiarizes users with corporate security policies in a formal and mandatory fashion

  1. user awareness
  2. physical access control
  3. user training
A
  1. user training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Port security - unauthorized MAC)

You want to configure a switch to discard traffic and increment the security violations counter when it receives traffic from a host with an unauthorized MAC address.
What command would accomplish this?

Restrict
protect
shutdown

A

Switchport port-security violation restrict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(Port security - unauthorized MAC)

You want to configure a switch to discard traffic but doesn’t increment the security violations counter when it receives traffic from a host with an unauthorized MAC address.
What command would accomplish this?

Restrict
protect
shutdown

A

Switchport port-security violation protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Port security - unauthorized MAC)

You want to configure a switch port to enter the err-disabled stated when it receives an unauthorized MAC address.
What command would accomplish this?

Restrict
protect
shutdown

A

Switchport port-security violation shutdown

NOTE: To bring the port back up you can issue the (errdisable recovery cause shutdown) command or issue the shutdown, no shutdown command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(choose 2)
which of the following are provided by IPSec?

  1. boradcast packet encapsulation
  2. multicast packet encapsulation
  3. data integrity
  4. data confidentiality
A
  1. data integrity
  2. data confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are most likely considered forms of authorization?

A. Assigning a role to a verified used
B. Logging a verified user file access
C. Verifying a users password
D. Allowing a user to access a specific file
E. Verifying a users fingerprint pattern

A

A. Assigning a role to a verified used
D. Allowing a user to access a specific file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly