successful logins |
Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated? |
Control plane and physical plane |
What functions of a switch does a software defined network separate? |
DNS poisoning |
Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name? |
DEP |
Which of the following can be used to prevent a buffer overflow attack? |
Secure Real-time Transport Protocol (SRTP) |
What is the recommended secure protocol for voice and video applications? |
resource records |
DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission. |
SFTP |
Which of these is the most secure protocol for transferring files? |
Virtual servers are less expensive than their physical counterparts. |
Which of the following is NOT a security concern of virtualized environments? |
Hardware as a Service (HaaS) |
Which of the following is NOT a service model in cloud computing? |
SNMPv3 |
Which version of Simple Network Management Protocol (SNMP) is considered the most secure? |
VDI |
Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations? |
firewall log |
Which type of device log contains the most beneficial security data? |
IP |
Which of the following TCP/IP protocols do not relate to security? |
Port mirroring |
Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs? |
event log |
Which type of log can provide details regarding requests for specific files on a system? |
community cloud |
Which type of cloud is offered to specific organizations that have common concerns? |
Type I |
Which type of hypervisor does not run on an underlying operating system? |
It can only handle the SSL protocol |
Which of these is NOT correct about an SSL accelerator? |
On-premises |
Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle? |
It can prevent a DNS transfer attack |
Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email? |
IS477 Unit 7
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price