Network + 7- 9 – Flashcards

Unlock all answers in this set

Unlock answers
question
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
answer
SIEM system?
question
?Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
answer
?Natas
question
?If multiple honeypots are connected to form a larger network, what term is used to describe the network?
answer
?honeynet
question
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below??
answer
?phishing
question
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
answer
?man-in-the-middle attack
question
?Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
answer
?TEMPEST
question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire??
answer
?virtual wire mode
question
At what layer of the OSI model do firewalls operate??
answer
Network
question
?What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
answer
?polymorphism
question
Botnets often make use of what chat protocol in order to receive commands??
answer
?IRC
question
Which software below serves as the firewall for Linux systems??
answer
?iptables
question
Which software below combines known scanning techniques and exploits to allow for hybrid exploits??
answer
?metasploit
question
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date??
answer
logic bomb?
question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire??
answer
?virtual wire mode
question
In ACL statements, the "any" keyword is equivalent to using what wildcard mask below?
answer
0.0.0.0
question
?A reflective attack can be increased in intensity by combining it with what type of attack?
answer
amplification attack
question
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below??
answer
banner-grabbing attack
question
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below??
answer
worms
question
A proxy that provides Internet clients access to services on its own network is known as what type of proxy??
answer
reverse proxy
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites??
answer
VPN gateway
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
answer
TKIP
question
?A SecurID key chain fob from RSA security generates a password that changes how often?
answer
every 60 seconds
question
What authentication protocol sends authentication information in cleartext without encryption??
answer
PAP
question
The combination of a public key and a private key are known by what term below?
answer
Key pair
question
How often should administrators and network users be required to change their password?
answer
60 days
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
answer
TKIP
question
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers??
answer
IaaS?
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
?SaaS
question
When using public and private keys to connect to an SSH server, where must your public key be placed??
answer
?In the authorized keys file on the host where the SSH server is.
question
When using public and private keys to connect to an SSH server, where must your public key be placed??
answer
In the authorized keys file on the host where the SSH server is.
question
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length??
answer
160 bit
question
At what layer of the OSI model does the IPSec encryption protocol operate??
answer
Network Layer
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
answer
TKIP
question
The SSH service listens on what TCP port?
answer
22
question
How often should administrators and network users be required to change their password?
answer
60 days
question
What authentication protocol sends authentication information in cleartext without encryption??
answer
PAP
question
At what layer of the OSI model does the IPSec encryption protocol operate??
answer
?Network layer
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
SaaS
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites??
answer
VPN gateway
question
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??
answer
TKIP
question
What protocol below is a Microsoft proprietary protocol first available in Windows Vista??
answer
SSTP
question
?The combination of a public key and a private key are known by what term below?
answer
?key pair
question
?The SSH service listens on what TCP port?
answer
?22
question
What authentication protocol sends authentication information in cleartext without encryption??
answer
PAP
question
Digital certificates are issued by organizations known as what term??
answer
certification authorities
question
At what layer of the OSI model does the IPSec encryption protocol operate??
answer
?Network layer
question
When using public and private keys to connect to an SSH server, where must your public key be placed??
answer
?In the authorized keys file on the host where the SSH server is.
question
?What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
?IPSec
question
?The combination of a public key and a private key are known by what term below?
answer
key pair
question
Digital certificates are issued by organizations known as what term??
answer
?certification authorities
question
What authentication protocol sends authentication information in cleartext without encryption??
answer
?PAP
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPSec
question
Digital certificates are issued by organizations known as what term??
answer
certification authorities
question
What security principle provides proof of delivery and proof of the sender's identity??
answer
non-repudiation
question
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
answer
EAP
question
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments??
answer
Citrix Xen
question
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
answer
MPLS
question
Which of the following is not a requirement in order to use a softphone??
answer
A wireless carrier to handle the voice path.
question
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
answer
H.323 gateway
question
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones??
answer
user agent client
question
SNMP agents receive requests from an NMS on what port number??
answer
161
question
What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
answer
user agent server
question
A highly available server is available what percentage of the time??
answer
99.99%
question
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications??
answer
5060
question
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018??
answer
79%
question
In H.323, which protocol below handles call or videoconference signaling?
answer
H.225
question
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below??
answer
Jabber
question
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones??
answer
user agent client
question
The Priority Code Point field in a frame consists of how many bits??
answer
3 bits
question
What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
answer
user agent server
question
Packets that exceed the medium's maximum packet size are known by what term??
answer
giants
question
?On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
answer
SS7
question
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?
answer
5060
question
SNMP agents receive requests from an NMS on what port number??
answer
?161
question
Packets that are smaller than a medium's minimum packet size are known by what term below?
answer
runts
question
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls??
answer
PCI DSS
question
?In a VoIP call, what method of transmission is used between two IP phones?
answer
unicast
question
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed??
answer
media gateway controller
question
A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?
answer
MCU
question
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers??
answer
honeypots lure
question
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or DSL connection and modem?
answer
SLIP PPP
question
A _________________ is a service that is shared between multiple organizations, but not available publicly.?
answer
Community Cloud
question
The key management phase of IPSec is reliant on which two services below?
answer
Internet Key Exchange (IKE) ?Internet Security Association and Key Management Protocol (ISAKMP)
question
What feature on some network switches can be used to detect faked arp messages?
answer
?dynamic ARP inspection
question
CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.
answer
True
question
What two different types of encryption can be used by IPSec during data transfer??
answer
Authentication Header (AH) ?Encapsulating Security Payload (ESP)
question
Different types of organizations have similar levels of network security risks.
answer
False
question
What protocol below is a Microsoft proprietary protocol first available in Windows Vista??
answer
SSTP
question
Networks that use ________________, such as T-1 or DSL connections to the Internet, are vulnerable to eavesdropping at a building' s demarc (demarcation point), at a remote switching facility, or in a central office.
answer
leased public lines
question
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers??
answer
laaS
question
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
answer
True
question
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP
answer
False
question
What option below is not an encryption algorithm method that is used by SSH?
answer
SHA-2
question
A SOHO wireless router typically acts as a firewall and may include packet filtering options
answer
True
question
What two terms below describe the process of manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment??
answer
traffic shaping? ?packet shaping
question
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent??
answer
botnet ?zombie army
question
?What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPSec
question
What two options below are AAA services??
answer
RADIUS TACACS+
question
The simplest type of firewall is a content filtering firewall.?
answer
False
question
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.?
answer
False
question
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.
answer
True
question
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
answer
True
question
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network??
answer
NOT SYN attck
question
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field??
answer
NOT encription
question
?What two terms below are used to describe an analog-to-digital voice conversion device that accepts and interprets both analog and digital voice signals?
answer
NOT NOT NOT Digital PBX ATA PBX
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New