• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?​
​user agent client
​The SSH service listens on what TCP port?

22

In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, where should the historian be placed
DMZ
The first step of a response policy should be to secure the area
False
In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?​
​Carrier Ethernet Transport
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
​H.323 gatekeeper

​How often should administrators and network users be required to change their password?

60 days

Cipher locks are not designed for physical security, such as on an outside door.

True

​The best 802.11n signal can travel approximately how far?

​1/4 mile

Digital certificates are issued by organizations known as what term?

certification authorities

​The DTE or endpoint device for a leased line is known as which device below?

​CSU/DSU

When performing inventory on software packages, which of the following is not something that should be inventoried?​

​proprietary source code

What team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?​

​public relations specialist

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.​

True

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?​

5060

What type of VLAN automatically receives all untagged frames?​

Native VLAN

A single switch can manage traffic belonging to several VLANs on a single interface, by configuring the interface as what option below?​

A trunk port

The first iteration of STP was defined in what IEEE standard below?​

802.1d

What version of xDSL is the most popular?​

​ADSL

​What option below is not an encryption algorithm method that is used by SSH?
​SHA-2
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.​
False
​What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
OpenFlow
What security principle provides proof of delivery and proof of the sender's identity?​
​non-repudiation
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?​
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?​
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​
TKIP
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?​
​160 bit
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
out-of-band management
In order to allow communication between VLANs for exchange of data, what must be used?
​a router
PPP can support several types of Network layer protocols that might use the connection
True
Which of the following is NOT a step that should be taken as part of a ​response policy?
​Attempt to access files to determine if they are compromised