Security Module 7 Flashcards

1
Q

Which of the followig is a limitation of a layer 2 switch compared to a layer 3 switch?

A

A layer 2 switch cannot pass traffic based on network destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does IMAP store its emails?

A

On a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which technology provides efficient use of public IP addresses?

A

PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an advantage to a network tap as opposed to port mirroring?

A

A network tap can analyze traffic faster than port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is the understanding of the OSI model so important from a troubleshooting standpoint?

A

The OSI model breaks down the transmission of data into layers which assists with identifying issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What needs to be changed to direct email to a third part remote spam filter?

A

MX record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Heuristic monitoring uses which of the following to determine if risk is present

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where is a NIPS generally located?

A

In a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a hub different from a switch or router

A

A hub does not read any data passing through the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a more secure alternative to PGP?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What technology would prohibit a client from connecting to the network due to an out-of-date antivirus?

A

NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why would an administrator create a baseline before purchasing equipment for network security?

A

A baseline can give the administrator an idea of which activities are considered normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a firewall terminate a connection that has already been established?

A

Through stateful packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two subprotocols are utilized by IPsec?

A

AH and ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Unified Threat Management Security Appliance can provide all of the following EXCEPT what?

A

Internal port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a proxy server contribute to a stronger defence?

A

Hides a client’s IP address

17
Q

Which of the following is NOT a capability of a load balancer?

A

Blocking based on a port number

18
Q

How does an internet content filter stop traffic based on the fact that it contains the word ‘drugs’?

A

Content inspection

19
Q

A web application firewall is an example of what?

A

Next-generation firewall

20
Q

What type of an attack can cause a switch to act as a hub?

A

MAC flooding