• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/115

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

115 Cards in this Set

  • Front
  • Back

Characteristics of tacacs+

Encrypt the entire package not just authenticating packets

Test for real-world hacker attack

Zero-knowledge team

When would choosing to do nothing about an identity risk be acceptable

When the cost of protecting the assets is greater than the potential loss

Which Network Technology creates virtual links between two remote Network end points by prefixing packets with a header containing one or more labels

Mpls

Which network type establishes a dedicated physical connection between two hosts in order to transmit time sensitive data

Circuit switch

Which component of change and configuration management policies identify Technical and budgetary considerations associated with a proposed change and also identifies any potential impact to the network

Feasibility analysis

Which of the following protocols is used by PPP to enable support for multi Network layer protocol

NCP

QR troubleshooting physical layer is shoes with a Gio / 1 interface in a router you need to view and analyze the number of collisions detected on the interface

Show interface GI 0/1

Which of the following are difference between radius and tacacs

Gradius combines authentication and authorization into a single function, tacacs the services to be split between different servers

Which of the following terms identifies the network of dial-up telephones and long-distance lines

Pstn

You have just started a new job as a network team leader for a small company. You are responsible for overseeing the work ofHelp Desk technicians, as well as doing your own share of the administrative work.To improve the safety of your organization, you decide to assemble Material Safety Data Sheets (MSDS) for all chemicals used inyour organization.

Download them from the chemical manufacturers website

To access the Internet through the PSTN, what kind of connectivity device must you use?

Modem

Which of the following is the strongest form of multi­factorauthentication?

A password, a biometric scan, and a tokendevice

If your anti­virus software does not detect and remove a virus, what should you tryfirst?
Update your virus detection software.
Users on your network report that they have received an email stating that the company has just launched a new website. Theemail asks employees to click the website link in the email and log in using their username and password. No one in yourcompany has sent this email.What type of attack isthis?

Phishing

What is the most common failure of a security policy in anenvironment?
Lack of userawareness
You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directedagainst other computers on the Internet.Which log would you check to see if this is happening?
Firewall
You manage the website for your company. The website uses a cluster of two servers with a single shared storage device. Theshared storage device uses a RAID 1 configuration. Each server has a single connection to the shared storage, and a singleconnection to your ISP.You want to provide redundancy such that a failure in a single component does not cause the website to be unavailable. Whatshould you add to your configuration to accomplish this?
Connect one server through a different ISP to theInternet
What is the most important element related to evidence in addition to the evidenceitself?
Chain of custody document
Which network type divides transmitted data into smaller pieces and allows for multiple communications on the networkmedium?
Packet­switched
When duplicating a drive for forensic investigative purposes, which of the following copying methods is mostappropriate?
Bit­levelcloning
What is the speed of an OC­3connection?

155 mbps

Which of the following forms of networking are highly susceptible to eavesdropping and must be secured accordingly?
Wireless

When implementing a Multiprotocol Label Switching (MPLS) WAN, which data unit is managed by the routers at differentsites?

PACKETS

What is the main difference between a worm and avirus?

A worm can replicate itself and does not need a host fordistribution.
You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all othersites. What type of connection is being used?
Point ­to ­multipoin
Which of the following devices accepts incoming client requests and distributes those requests to specificservers?
Load balancer
Which of the following devices can monitor a network and detect potential securityattacks?

IDS

Which protocol uses traps to send notifications from network devices?

snmp

Because of an unexplained network slowdown on your network, you decide to install monitoring software on several key networkhosts to locate the problem. You will then collect and analyze the data from a central network host.What protocol will the software use to detect theproblem?
SNMP
Which method can be used to verify that a bit­level image copy of a hard drive is an exact clone of the original hard drivecollected as evidence?
Hashing
In troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnetaddresses of each connected subnet.Which type of document would most likely have this information?
Network diagram
Each of the following are tools used to check the health of anetwork. Which of these is typically used for managing and sending messages from one computer system toanother?
syslog
A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to thewireless network and then uses NMAP to probe various network hosts to see which operating system they are running.Which process did the administrator use in the penetration test in thisscenario?
Active fingerprinting
Which of the following defines an acceptable useagreement?
An agreement which identifies the employee's rights to use company property such as Internet access and computerequipment for personal use.
Which of the following WAN technologies provides packet switching over high­quality digital lines at speeds greater than 1.544Mbps?I
FrameRelay
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers lookingfor security violations?
IDS
When recovery is being performed due to a disaster, which services are to be stabilizedfirst?
Missioncritical
You are troubleshooting a workstation connection to the network. During your troubleshooting, you replace the drop cableconnecting the computer to the network.Which type of document should you update?
Change documentation
Which of the following statements about ESD is notcorrect?
ESD is much more likely to occur when the relative humidity is above50%
A new law was recently passed that states that all businesses must keep a history of all e­mails sent between members of theboard of directors. You need to ensure that your organization complies with this law.Which document type would you update first in response to this new law?
Policy
You have a web server that will be used for secure transactions for customers who access the website over the Internet. Theweb server requires a certificate to support SSL.Which method would you use to get a certificate for theserver?O
Obtain a certificate from a publicPKI.
Which of the following terms describes a test lab environment that does not require the use of physicalhardware?
Virtual sandbox
You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able tosee broadcast frames and frames addressed specifically to the host device.Which feature should you enable on the switch so you can see frames from all devices connected to theswitch
Mirroring
Which component of a Change and Configuration Management policy specifies options for reverting a system back to the state itwas in before a change was made?
Rollback
Which of the following is a mechanism for granting and validatingcertificates?
PKI
Which of the following information are you likely to find in a proceduredocument?
Details on how to test and deploypatches.
Which of the following is the best recommendation for applying hotfixes to yourservers?
Apply only the hotfixes that apply to software running on your systems
Which of the following can be used to stop piggybacking that has been occurring at a front entrance where employees shouldswipe their smart cards to gain entry?
Deploy amantrap
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transferpatient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in theworld, even remote areas?
Satellite
You are the network administrator for a growing business. When you were initially hired, the organization was small and only asingle switch and router were required to support your users. During this time, you monitored log messages from your routerand switch directly from each device's console.However, the organization has grown considerably in recent months. You now must manage 8 individual switches and threerouters. It's becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.What should you do?
Use syslog to implement centralized logging.
You manage a network that uses switches. In the lobby of your building are three RJ­45 ports connected to aswitch.You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network.However, employees who plug into those same jacks should be able to connect to the network.What feature should you configure?
Port authentication
You need to find out what kind of laws might apply to the design and operation of your network. Which type of document wouldyou consult
Regulation
Which of the following is defined as a contract which prescribes the technical support or business parameters that a provider willbestow to its client?
Service levelagreement
Question 60: IncorrectYou want to allow traveling users to connect to your private network through the Internet. Users will connect from variouslocations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able toconfigure the firewalls that might be controlling access to the Internet in these locations.Which of the following protocols would be most likely to be allowed through the widest number offirewalls?
SSL
Which of the following Internet services provides equal upload and download bandwidth?
SDSL
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using adedicated link.What type of connection is being used?
Point ­to­ point
You are interested in identifying the source of potential attacks that have recently been directed against your network but whichhave been successfully blocked.Which log would you check?
Firewall
You have recently experienced a security incident with one of your servers. After some research, you determine that the hotfix#568994 that has recently been released would have protected the server.Which of the following recommendations should you follow when applying the hotfix?
Test the hotfix, then apply it to allservers.
Which of the following is a policy that defines appropriate and inappropriate activities and usage for company resources, assets,and communications?
Acceptable usepolicy
You are reviewing the output of the show interfaces command for the Gi0/1 interface on aswitch. Which interface statistic displays the number of collisions that occurred after the 64th byte of the frame wastransmitted?
Late collisions
Which of the following devices is used on a WAN to convert synchronous serial signals into digitalsignals?
CSU/DSU
Which of the following is a text file provided by a website to a client that is stored on a user's hard drive in order to track andrecord information about the user?
Cookie

Your organization's security policy specifies that any mobile device (regardless of ownership) that connects to your internalnetwork must have remote wipe enabled. If the device is lost or stolen, then it must be wiped to remove any sensitive data fromit.Your organization recently purchased several Windows RT tablets. Which should you do?

Sign up for a Microsoft Intune account to manage thetablets

Even if you perform regular backups, what must be done to ensure that you are protected against dataloss?

Regularly test restorationprocedures

Over the last month you have noticed a significant increase in the occurrence of inappropriate activities performed by employees.What is the best first response step to take in order to improve or maintain the security level of the environment?

Improve and hold new awareness sessions

You have a group of salesmen who would like to access your private network through the Internet while they are traveling. Youwant to control access to the private network through a single server.Which solution should you implement?

VPN concentrator

The chain of custody is used for what purposes?
Listing people coming into contact with evidence
Which of the following protocols can be used to centralize remote accessauthentication?
TACACS
A smart phone was lost at the airport. There is no way to recover the device. Which if the following will ensure dataconfidentiality on the device?
Remotewipe
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connectdirectly to a server in your office and access files on that server that you need.You want the connection to be as secure as possible. Which type of connection will youneed?
Remoteaccess
Which of the following attacks tries to associate an incorrect MAC address with a known IPaddress?
ARP poisoning
Which of the following is a WAN technology that allows for interoperability of vendor hardware for fiber opticnetworking?
SONET
Which of the following uses hacking techniques to proactively discover internalvulnerabilities?
Penetrationtesting
You want to increase the security of your network by allowing only authenticated users to be able to access network devicesthrough a switch.Which of the following should you implement?
802.1x
If an organization shows sufficient due care, which burden is eliminated in the event of a securitybreach?
Negligence
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind ofattack?
DDoS
Which type of Internet service uses the DOCSISspecification?
Coaxialcable
Which of the following protocols can be used to securely manage a network device from a remoteconnection?
SSH
You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that hasbeen rejected by the firewall in the past month.Which tool should you use?
Event log
Which of the following statements about the use of anti­virus software iscorrect?
Anti­virus software should be configured to download updated virus definition files as soon as they becomeavailable
Anti­virus software should be configured to download updated virus definition files as soon as they becomeavailable
CSU/DSU
You manage a network that uses switches. In the lobby of your building are three RJ­45 ports connected to aswitch.You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network.However, employees who plug into those same jacks should be able to connect to the network.What feature should you configure?
Port authentication
You are in the habit of regularly monitoring performance statistics for your devices. You find that this month a specific server hasaveraged a higher number of active connections than last month.Which type of document should you update to reflect the change?
Baseline
Which of the following is a standard for sending log messages to a central loggingserver?
Syslog
You walk by the server room and notice a fire has started. What should you dofirst?
Make sure everyone has cleared thearea.
What type of malware monitors youractions?
Spyware
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trustedsubnet?S
IDS
Which of the following is the most common detection method used by an IDS?
Signature
Consider the network shown in the exhibit.When you run the show interfaces command on switch1, you observe a significant number of runts on the Gi0/1 interface.What does this statisticindicate
Collisions are occurring.
What is the most effective means of improving or enforcing security in anyenvironment?
User awarenesstraining
Members of the Sales team use laptops to connect to the company network. While traveling, they connect their laptops to theInternet through airport and hotel networks.You are concerned that these computers will pick up viruses that could spread to your private network. You would like toimplement a solution that prevents the laptops from connecting to your network unless anti­virus software and the latestoperating system patches have been installed.Which solution should you use?
NAC
RADIUS is primarily used for what purpose?
Authenticating remote clients before access to the network isgranted
Which of the following services are available regardless of whether the telephone company network isavailable?
Cable modem
What is the primary goal of business continuity planning?
Maintaining business operations with reduced or restricted infrastructure capabilities orresources
Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is stillsome risk left. What is the remaining risk called?
Residualrisk
Which of the following is most susceptible to interference related to atmosphericconditions?
Satellite
Which of the following network strategies connects multiple servers together such that if one server fails, the others immediatelytake over its tasks, preventing a disruption in service?
Clustering
Which of the following technologies uses variable­length packets and adds labels to packets as they enter the WAN cloud, withthe labels being used to switch packets and prioritize traffic?
MPLS
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec providesencryption for traffic between devices.You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any maliciousattacks. Which solution should you implement?
Host­based IDS
You want to be able to identify traffic that is being generated and sent through the network by a specific application running on adevice.Which tool should you use?
Protocol analyzer
Which of the following networking devices or services prevents the use of IPsec in mostcases?
NAT
Why should backup media be stored offsite?
To prevent the same disaster from affecting both the network and the backupmedia
You've just deployed a new Cisco router that connects several network segments in yourorganization.The router is physically located in a server room that requires an ID card to gain access. You've backed up the routerconfiguration to a remote location in an encrypted file. You access the router configuration interface from your notebookcomputer by connecting it to the console port on the router. You configured the management interface with a user name ofadmin and a password of password.What should you do to increase the security of thisdevice?
Use a stronger administrativepassword.
Use a stronger administrativepassword.
DSL
Question 111: IncorrectWhich of the following protocols or services would you associate with Window's Remote Desktop Services networktraffic?

RDP

What is the greatest threat to the confidentiality of data in most secureorganizations?

usb devices

Purchasing insurance is what type of response to risk
Transference
Which type of device is required to implement port authentication through aswitch?
RADIUS server
Which of the following is an example of an internalthreat
A user accidentally deletes the new productdesigns
Your client has acquired several small companies and would like to connect them together into one network. Not all of therouters are Cisco devices and compatibility is a concern.Which WAN encapsulation method should you recommend your client use?

PPP

Components within your server room are failing at a rapid pace. You discover that the humidity in the server room is at 60% andthe temperature is at 80 degrees.What should you do to help reduce problems?
Add a separate A/C unit in the serverroom
What is the primary purpose of penetrationtesting?
Test the effectiveness of your securityperimeter
You want to know what protocols are being used on your network. You'd like to monitor network traffic and sort traffic based onprotocol.Which tool should you use?
Packetsniffe
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a devicewhich is connected to the same hub that is connected to the router.When you run the software, you only see frames addressed to the workstation and not otherdevices. Which feature should you configure?
Promiscuous mode