Security+ Practice Test 7 Flashcards

1
Q

A network device designed for managing the optimal distribution of workloads across multiple computing resources is known as:

A

Load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the terms listed below refers to a method that ignores the load balancing algorithm by consistently passing requests from a given client to the same server?

A

Session affinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a round-robin method, each consecutive request is handled by:

A

Next server in a cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a weighted round-robin method, each consecutive request is handled in a rotational fashion, but servers with higher specs are designated to process more workload.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In active-passive mode, load balancers distribute network traffic across:

A

Servers marked as active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In active-active mode, load balancers distribute network traffic across:

A

All servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IP address that doesn’t correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of IP address would be assigned to a software-based load balancer to handle an Internet site hosted on several web servers, each with its own private IP address?

A

Virtual IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as:

A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following acronyms is used as a unique identifier for a WLAN (a wireless network name)?

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disabling SSID broadcast:

A

Makes a WLAN harder to discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network security access control method whereby the 48-bit physical address assigned to each network card is used to determine access to the network is known as:

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the tools listed below would be of help in troubleshooting signal loss and low wireless network signal coverage?

A

WAP power level controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Frequency bands for IEEE 802.11 networks include:

A
  1. 0 GHz

2. 4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?

A

Dipole antenna

17
Q

Which of the antenna types listed below provide a 360-degree horizontal signal coverage?

A

Dipole antenna

Omnidirectional antenna

18
Q

Which of the following answers refer to highly directional antenna types used for long-range point-to-point bridging links?

A

Dish antenna

Unidirectional antenna

19
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

A

War driving

20
Q

A type of architecture in which most of the network configuration settings of an Access Point (AP) are set and managed with the use of a central switch or controller is called:

A

Thin AP

21
Q

The term “Fat AP” refers to a stand-alone Access Point (AP) device type offering extended network configuration options that can be set and managed after logging in to the device.

A

True

22
Q

A technology that allows for real-time analysis of security alerts generated by network hardware and applications is known as:

A

SIEM

23
Q

Which of the following statements describing the functionality of SIEM is not true?

A

Use of rewritable storage media

24
Q

Which of the terms listed below refers to computer data storage systems, data storage devices, and data storage media that can be written to once, but read from multiple times?

A

WORM

25
Q

Which of the following acronyms listed refers to software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of the corporate network?

A

DLP