Security – Chapter 7

Your page rank:

Total word count: 826
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.

True

The most popular implementation of DNS is the Unix Internet Name Domain.

False

Trivial File Transfer Protocol (TFTP) uses a more memory when compared to FTP.

False

SNMP-managed devices must have an agent or a service that listens for commands and then executes them.

True

S/MIME can be used when mail is accessed through a web browser.

False

A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS) attacks.

False

A correlation engine aggregates and correlates content from different sources to uncover an attack.

True

Type I hypervisors run on the host operating system.

False

A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.

False

File integrity check (FIC) is a service that can monitor any changes made to computer files, such as operating system files.

True

What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

C. TCP/IP

At what level of the OSI model does the IP protocol function?

B. Network Layer

Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?

D. Transport Layer

When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

B. Community string

Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

D. DNS

DNS poisoning can be prevented using the latest edition of what software below?

A. BIND

An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?

C. 21

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

B. Router

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

A. VLAN

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

D. Hypervisor

Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor’s software applications running on a cloud infrastructure?

C. Software as a Service

In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?

B. Infrastructure as a Service

Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?

C. SNMP

Which of the following protocols is unsecured?

D. FTP

Select the email protocols that are not secure? (Choose all that apply.)

C. POP D. IMAP

What secure protocol is recommended for time synchronization?

C. NTP

What secure protocol is recommended for voice and video?

A. SRTP

What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?

B. SSL/TLS accelerator

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?

D. port mirroring

What hardware device can be inserted into a network to allow an administrator to monitor traffic?

A. Network tap

What type of switch is used to combine multiple network connections into a single link?

C. aggregation switch

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

C. application whitelist

What secure protocol is recommended for Network address translation

D. IPSec

What specific issues are associated with log management? (Choose all that apply.)

A. The multiple devices generating logs. B. The different log formats. C. The fast network transfer speeds.

hat type of system is designed to collect and consolidate logs from multiple sources for easy analysis?

A. Centralized device log analyzer

Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?

C. Virtualization

What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?

B. Hosted services

Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?

C. VDI

What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)

A. Data plane D. Data Plane

On and SDN network, what specific unit gives traffic the permission to flow through the network?

D. SDN Controller

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending