Global Security Final Exam 51-75

11 September 2022
4.7 (114 reviews)
25 test answers

Unlock all answers in this set

Unlock answers (21)
question
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
answer
signature-based
question
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
answer
Create a DMZ, add necessary hosts
question
The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?
answer
Create a VLAN and add the users' computers/ports to the correct VLAN
question
What technology will examine the current state of a network device before allowing it can to connect to the network and force any device that does not meet a specified set of criteria to connect only to a quarantine network?
answer
network access control
question
What type of dedicated cryptographic processor that provides protection for cryptographic keys?
answer
hardware security module
question
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?
answer
split tunneling
question
What dedicated hardware device aggregates hundreds or thousands of VPN connections?
answer
VPN concentrator
question
What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?
answer
extranet
question
If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?
answer
physical network segregation
question
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
answer
agentless NAC
question
Which of the following is defined as a security analysis of the transaction within its approved context?
answer
content inspection
question
DNS poisoning can be prevented using the latest edition of what software below?
answer
BIND
question
An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?
answer
21
question
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
answer
router
question
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?
answer
Software as a Service
question
In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
answer
Infrastructure as a Service
question
Which of the following protocols is unsecured?
answer
FTP
question
What secure protocol is recommended for time synchronization?
answer
NTP
question
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
answer
SSL/TLS accelerator
question
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
answer
port mirroring
question
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
answer
network tap
question
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
answer
application whitelist
question
What secure protocol is recommended for Network address translation?
answer
IPsec
question
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?
answer
centralized device log analyzer
question
What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?
answer
hosted servies