Security Chapter 8

9 September 2022
4.7 (114 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
answer
community string
question
What is the term used for a device that requests permission from an authenticator to join a network?​
answer
​Supplicant
question
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
answer
true
question
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
answer
False - it uses 4 layers
question
In what type of cloud computing does the customer have the highest level of control?
answer
Cloud Infrastructure as a Service
question
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
answer
DNS
question
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:
answer
flood guard
question
IEEE 802.1x is commonly used on wireless networks.
answer
true
question
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
answer
VLAN
question
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
answer
router
question
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
answer
Cloud Software as a Service
question
At what level of the OSI model does the IP protocol function?
answer
Network Layer
question
The capability for devices to exchange low-level control messages is provided by what protocol below?
answer
ICMP
question
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
answer
IEEE 802.1x
question
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
answer
TCP/IP
question
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
answer
21
question
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?
answer
Transport Layer
question
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
answer
False
question
​What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?
answer
Sticky
question
IP telephony and Voice over IP (VoIP) are identical.
answer
false
question
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
answer
FTPS - FTP Secure
question
An unsecure TCP/IP protocol that is commonly used for transferring files
answer
FTP - File Transfer Protocol
question
A means of managing and presenting computer resources by function without regard to their physical layout or location..
answer
Virtualization
question
A log that is used to record which user performed an action and what that action was..
answer
Audit Log
question
A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack..
answer
Flood Guard
question
Log that documents any unsuccessful events and the most significant successful events.
answer
event log
question
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA).
answer
loop protection
question
An older TCP/IP protocol and an application used for text-based communication
answer
telnet
question
The ability to easily expand or contract resources in a virtualized environment.
answer
host elasticity
question
An instance of a particular state of a virtual machine that can be saved for later use.
answer
snapshot