C Danvers
Quiz by , created more than 1 year ago

Ch 7 quiz

821
0
0
C Danvers
Created by C Danvers about 6 years ago
Close

Ch 7 - Administering a Secure Network

Question 1 of 38

1

A correlation engine aggregates and correlates content from different sources to uncover an attack.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 38

1

A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS) attacks.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 38

1

An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?

Select one of the following:

  • 19

  • 21

  • 22

  • 20

Explanation

Question 4 of 38

1

A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.

Select one of the following:

  • True
  • False

Explanation

Question 5 of 38

1

At what level of the OSI model does the IP protocol function?

Select one of the following:

  • Transport Layer

  • Data Link Layer

  • Presentation Layer

  • Network Layer

Explanation

Question 6 of 38

1

File integrity check (FIC) is a service that can monitor any changes made to computer files, such as operating system files.

Select one of the following:

  • True
  • False

Explanation

Question 7 of 38

1

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

Select one of the following:

  • MAC address

  • subnets

  • VLAN

  • IP address

Explanation

Question 8 of 38

1

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?

Select one of the following:

  • port snooping

  • interface capture

  • port mirroring

  • port identity

Explanation

Question 9 of 38

1

In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?

Select one of the following:

  • Software as a Service

  • Application as a Service

  • System as a Service

  • Infrastructure as a Service

Explanation

Question 10 of 38

1

On and SDN network, what specific unit gives traffic the permission to flow through the network?

Select one of the following:

  • SDN gateway

  • SDN router

  • SDN firewall

  • SDN controller

Explanation

Question 11 of 38

1

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

Select one of the following:

  • malware management

  • application whitelist

  • application control

  • inventory permissions

Explanation

Question 12 of 38

1

Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

Select one of the following:

  • NIS

  • WINS

  • TACACS+

  • DNS

Explanation

Question 13 of 38

1

S/MIME can be used when mail is accessed through a web browser.

Select one of the following:

  • True
  • False

Explanation

Question 14 of 38

1

SNMP-managed devices must have an agent or a service that listens for commands and then executes them.

Select one of the following:

  • True
  • False

Explanation

Question 15 of 38

1

TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 38

1

The most popular implementation of DNS is the Unix Internet Name Domain.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 38

1

Trivial File Transfer Protocol (TFTP) uses a more memory when compared to FTP.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 38

1

Type I hypervisors run on the host operating system.

Select one of the following:

  • True
  • False

Explanation

Question 19 of 38

1

What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)

Select one or more of the following:

  • management plane

  • control plane

  • data plane

  • all of the above

Explanation

Question 20 of 38

1

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

Select one of the following:

  • router

  • switch

  • bridge

  • hub

Explanation

Question 21 of 38

1

What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?

Select one of the following:

  • SSL/TLS tap

  • SSL/TLS access point

  • SSL/TLS accelerator

  • SSL/TLS mirror

Explanation

Question 22 of 38

1

What hardware device can be inserted into a network to allow an administrator to monitor traffic?

Select one of the following:

  • network tap

  • network mirror

  • shark box

  • shark tap

Explanation

Question 23 of 38

1

What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

Select one of the following:

  • IPX/SPX

  • TCP/IP

  • Appletalk

  • UDP

Explanation

Question 24 of 38

1

What secure protocol is recommended for Network address translation?

Select one of the following:

  • S/MIME

  • IMAP

  • SRTP

  • IPsec

Explanation

Question 25 of 38

1

What secure protocol is recommended for time synchronization?

Select one of the following:

  • SRTP

  • NTP

  • S/MIME

  • POP

Explanation

Question 26 of 38

1

What secure protocol is recommended for voice and video?

Select one of the following:

  • IPsec

  • S/MIME

  • IMAP

  • SRTP

Explanation

Question 27 of 38

1

What specific issues are associated with log management? (Choose all that apply.)

Select one or more of the following:

  • The large volume of data that needs to be logged

  • The multiple devices generating logs

  • The different log formats

  • The fast network transfer speeds

Explanation

Question 28 of 38

1

What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?

Select one of the following:

  • cloud services

  • hosted services

  • volume computing

  • virtual services

Explanation

Question 29 of 38

1

What type of switch is used to combine multiple network connections into a single link?

Select one of the following:

  • gateway switch

  • core switch

  • access switch

  • aggregation switch

Explanation

Question 30 of 38

1

What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

Select one of the following:

  • centralized device log analyzer

  • system log manager

  • network log device

  • core device log analyzer

Explanation

Question 31 of 38

1

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

Select one of the following:

  • supervisor

  • hypervisor

  • hypercard

  • kernel

Explanation

Question 32 of 38

1

When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

Select one of the following:

  • MIB

  • entity

  • community string

  • OID

Explanation

Question 33 of 38

1

Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?

Select one of the following:

  • Sofware as a Service

  • System as a Service

  • Application as a Service

  • Infrastructure as a Service

Explanation

Question 34 of 38

1

Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?

Select one of the following:

  • Presentation Layer

  • Application Layer

  • Network Layer

  • Transport Layer

Explanation

Question 35 of 38

1

Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?

Select one of the following:

  • SDN

  • VDI

  • PaaS

  • SaaS

Explanation

Question 36 of 38

1

Which of the following protocols is unsecured?

Select one of the following:

  • SSL

  • TLS

  • HTTPS

  • FTP

Explanation

Question 37 of 38

1

Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

Select one of the following:

  • FTP

  • SRTP

  • SNMP

  • TCP/IP

Explanation

Question 38 of 38

1

Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?

Select one of the following:

  • PaaS

  • cloud computing

  • IaaS

  • virtualization

Explanation