Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Which of the following refers to the end user’s desktop devices such as a desktop computer, laptop, VoIP telephone, or other endpoint device? |
Workstation Domain |
|
Which of the following refers to the entity responsible for global coordination of IP addressing, DNS root, and other Internet protocol resources? |
Internet Assigned Numbers Authority (IANA) |
|
Which of the following is not a characteristic of a private address? |
They are leased to users and businesses |
|
Which term describes a form of security based on hiding details of a system, or creating convolutions that are difficult to understand? |
Security through obscurity
|
|
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a set of characters or hex values)?
|
Brute-force attack |
|
Which attack uses a pre-constructed list of potential passwords or encryption keys? |
Dictionary password attack
|
|
Which protocol and a data exchange system commonly used over TCP/IP networks, including the Internet, but which is unencrypted and performs authentication and data transfer in plaintext? |
File Transfer Protocol (FTP) |
|
Which of the following refers to the process of simulating and testing a new concept, design, programming technique, and so on before deployment into a production environment?
|
Modeling |
|
Which of the following refers to the hardware, operating system software, database software, client-server applications, and data that are typically housed in the organization’s data center and/or computer rooms? |
System/Application Domain |
|
Which of the following is given to an Application Layer protocol used by e-mail clients to receive messages from an e-mail server? |
Post Office Protocol (POP)
|
|
Which term describes portions of a software system that unauthenticated users can run? |
Attack surface
|
|
Which of the following is defined as the act of avoiding single points of failure by building in multiple elements, pathways, or methods of accomplishing each mission-critical task? |
Redundancy |
|
Which of the following is not true of VLANs? |
They require a change of IP address or re-cabling. |
|
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects of an IT infrastructure for aberrant or abnormal events of any type. |
True
|
|
The WAN Domain refers to the hardware, operating system software, database software, client-server applications, and data that are typically housed in the organization’s data center and/or computer rooms. |
False |
|
SMTP is an Application Layer protocol used by e-mail clients to send messages to an e-mail server and is also used to relay messages between e-mail servers. |
True |
|
Telnet is a protocol and a service used to remotely control or administer a host through a plaintext command-line interface. |
True |
|
Multifactor authentication is significantly less secure than any single factor form of authentication. |
False
|
|
The principle of least privilege states that you should grant users the fewest capabilities, permissions, and privileges possible to complete their assigned work, without additional capabilities. |
True |
|
Node security focuses on the tasks for each type of networking device to improve its security; it takes the generic recommendations of system hardening and expands them with additional node/host specific improvements. |
True |
|
sdf |
sdf |
|
sdf |
sdf |