Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Which of the following passwords is best to use on a system containing highly sensitive information? |
0OxqH}ml2-wOn |
|
Which of the following is a technique you can use to help secure a wireless network? (Choose all that apply.) |
MAC address filtering AND WPA2 |
|
Which of these protocols is used for VPNs? (Choose all that apply.) |
PPTP, SSTP, AND L2TP |
|
How do VPNs accomplish the “private” part of a virtual private network? |
Tunneling |
|
Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can’t respond to normal traffic? |
DoS |
|
Which of the following is a guideline for creating a security policy? |
A security policy should be enforceable. |
|
Which of the following is a component of a security policy? (Choose all that apply.) |
Authentication policy AND Privacy policy |
|
Which of the following questions must be answered before determining what level of security a network requires? (Choose all that apply.) |
What’s being protected? AND From whom should data be protected? |
|
Which of the following should be a common element in any level of security policy? (Choose all that apply.) |
Backup procedures AND Virus protection |
|
Which phrase from the following list best completes this sentence? If there’s access to the equipment, there’s no ______. |
physical security |
|
Which of the following is a requirement for rooms housing network servers? |
Adequate cooling |
|
Which procedure specifies what resources users can access and the tasks they can perform on a network? |
Authorization |
|
If you want to allow a blank password on a Windows computer, which of the following do you set the password minimum length to? |
0 (zero) |
|
If you want to prevent password guessing to foil intruders, you should enable which of the following? |
Account lockout |
|
Which authentication protocol is used in a Windows domain environment? |
Kerberos |
|
Which of the following is a credential category? (Choose all that apply.) |
Knowledge AND Inherence AND Possession |
|
Which of the following is a method IPsec uses to authenticate the identity of communicating devices? (Choose all that apply.) |
Kerberos AND Digital certificates |
|
To encrypt data stored on a hard drive on a Windows Server computer, you should use which of the following? |
EFS |
|
Fire walls can filter packets based on which of the following? (Choose all that apply.) |
Source address AND Protocol |
|
If network administrators want to be informed when an attempt has been made to compromise the network, what should they use? |
IDS |
|
Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office? |
Site-To-Site |
|
Where’s a common place to install an NIDS? |
In the DMZ |
|
What device should you consider installing if you want countermeasures to take place when an attack is detected? |
IPS |
|
In which of the following areas does a WAN differ from an internet work? (Choose all that apply.) |
WANs use service providers for the network connection AND WANs use serial communication technologies that can span miles. |
|
Which of the following is a device used to make WAN connections? (Choose all that apply.) |
CSU/DSU AND Router |
|
Which of the following best describes a digital signal? |
A series of binary values |
|
For what purpose is a CSU/DSU used? |
Creates a digital connection between a LAN device and the WAN link |
|
Which of the following is a common WAN connection method? (Choose all that apply.) |
Circuit switched AND Packet switched |
|
Which of the following is true about ISDN? |
It uses a terminal adapter to connect to the network. |
|
Which of the following is a typical situation in which leased lines should be considered?(Choose all that apply.) |
24/7 access is required AND Fast upstream and downstream communications are needed. |
|
Which of the following combines several communication streams into a single faster communication stream? |
Multiplexing |
|
Which physical topology does SONET readily support? (Choose all that apply.) |
Point-to-point AND Star AND Ring |
|
Which of the following technologies uses packet-switching? (Choose all that apply.) |
Frame relay AND X.25 |
|
Which of the following technologies provides permanent virtual circuits? (Choose all that apply.) |
Frame relay AND X.25 |
|
Which technology uses 53-byte cells? |
ATM |
|
To maintain security, WAN connections over the Internet should use which of the following? |
VPN |
|
What type of device is required to connect to a dedicated digital communication line? |
CSU/DSU |
|
Which term best describes the place in a WAN connection where the customer’s responsibility ends and the provider’s responsibility begins? |
Demarcation point |
|
Which of the following places data on the local loop? |
DCE |
|
Which of the following is the equipment at the customer site that’s the responsibility of the customer? |
CPE |
|
Which of the following is a VPN protocol supported by Windows remote access? (Choose all that apply.) |
PPTP AND L2TP AND SSTP |
|
Which of the following is a component of the PPP protocol? (Choose all that apply.) |
Link control protocol AND NCP |
|
Which of the following can best be described as developing applications by using a service provider’s development tools and infrastructure? |
Hosted platforms |
|
Which wireless WAN technology has a standard for fixed and mobile devices? |
WiMAX |
|
Which wireless WAN technology might not be suitable for voice applications because of latency? |
Satellite |