Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Which of the following can be defined as an Internet protocol by which a client workstation can dynamically access a mailbox on a server host to manipulate and retrieve mail messages that the server has received and is holding for the client? |
IMAP4 |
|
Which of the following statements pertaining to Asynchronous Transfer Mode (ATM) is false? |
It carries various sizes of packets |
|
Which conceptual approach to intrusion detection system is the most common? |
Knowledge-based intrusion detection |
|
Why is Network File System (NFS) used? |
It enables two different types of file systems to interoperate. |
|
What refers to legitimate users accessing networked services that would normally be restricted to them?
|
Logon abuse |
|
The older coaxial cable has been widely replaced with twisted pair, which is extremely easy to work with, inexpensive, and also resistant to multiple hosts failure at once, especially when used in one of the following topology: |
Star Configuration. |
|
Layer 7 Applications Layer Provides specific services for applications such as: (5) |
FTP (File Transfer Protocol) |
|
Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host? |
Anomaly Detection. |
|
Which of the following statements pertaining to packet filtering is incorrect? |
It keeps track of the state of a connection. |
|
The basic language of modems and dial-up remote access systems is: |
Asynchronous Communication. |
|
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of the following? |
Presentation Layer |
|
Which of the following mechanisms was created to overcome the problem of collisions that occur on wired networks when traffic is simultaneously transmitted from different nodes? |
Carrier sense multiple access with collision detection (CSMA/CD) |
|
What is also known as 10Base5? |
Thicknet |
|
Domain Name Service is a distributed database system that is used to map: |
Domain Name to IP addresses. |
|
The Domain Name System (DNS) is a global network of: |
servers that provide these Domain Name Services. |
|
Which of the following rules appearing in an Internet firewall policy is inappropriate? |
Firewalls shall be configured to passively allow all outbound and inbound services. |
|
What is an IP routing table? |
A list of station and network addresses with corresponding gateway IP address. |
|
What would you call the process that takes advantages of the security provided by a transmission protocol by carrying one protocol over another? |
Tunneling |
|
What is the BEST answer pertaining to the difference between the Session and Transport layers of the OSI model? |
The Transport layer sets up communication between computer systems, while the Session layer sets up connections between applications. |
|
Which of the following protocols offers native encryption? |
IPSEC, SSH, SSL, TLS |