Study Cards Flashcards
The length of time a computer is allowed to use a dynamic Internet Protocol (IP) address provided by a DHCP server is known as the ________.
Lease Time
True/False: A Network collision happens when two devices attempt to communicate on the same physical segment at the same time.
True
True/False: A Firewall can permit, deny, encrypt, decrypt and proxy all computer traffic that flows through it.
True
True/False: Firewalls are not usually a combination of hardware and software.
False
Which type of security device or software employs a redirection device known as a honeypot.
IPS (Intrusion Prevention System)
Which Type of firewall keeps track of existing connections passing through it?
Stateful
If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?
Content Filtering
What is a firewall’s list of rules, which it uses to block traffic?
Access Control list (ACL)
If you want to allow remote access to 500 users, which type of device is recommended?
VPN Concertrator
What is a security zone that allows public traffic but is isolated from the private network called?
DMZ
Which unsecure protocol uses port 80 by default?
HTTP
What is 192.168 in Binary?
1100000.1010100
What port number does Secure Shell (SSH) use by default?
22
Logging, notification, and shunning are what types of reactions from type of security device?
Passive reactions from an IDS
True/False: A demilitarized zone (DMZ) is a network segment that is neither public nor local but halfway between.
True
You add a new cable to your network. What document do you update?
Wiring schematics
True/False: An intrusion detection system replaces a firewall on your network.
False
True/False: An intrusion detection system (IDS) can detect within encrypted traffic.
False
An Intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion.
True
192.168.10.28/28 is an example of which kind of notation?
CIDR
Which terminal emulation program is insecure because it does not encrypt any data including usernames and passwords?
Telnet
Which network topology has the most physical connections per host, which means it will have the least collisions?
Mesh
In a Class C Address, a network ID is how man bits?
24
100BaseTF uses what type of cable medium?
Ethernet over Fiber
True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block?
False
A UTP cable running 1000Mbps can be a maximum distance of ________.
100 Meters
How can you verify that your DMZ is allowing TCP ports through?
Telnet to the ports in question on the DMZ server.
True/False: A parabolic is a type of omnidirectional antenna.
False
True/False: A dipole is an omnidirectional antenna.
True
A network administrator is going to implement a packet filter on a network for Internet connections. What port must be allowed through the firewall for users to connect to secure websites?
443