Security+ Chapter 10 – Flashcards

Unlock all answers in this set

Unlock answers
question
_____________ is/are computers in a network that host applications and data for everyone to share. - Linux boxes - Servers - Firewalls - Cryptography
answer
Servers
question
A(n) _________ is a network device that can be hardware, software, or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet - blister pack - entity relationship diagram - server - firewall
answer
firewall
question
Network access control is - A Microsoft technology for controlling network access - A security methodology involved in managing endpoints as they connect on a case-by-case basis - The use of ACLs to permit network access - MAC filtering on wireless device
answer
A security methodology involved in managing endpoints as they connect on a case-by-case basis
question
A virtual private network (VPN) is a construct used to provide - Users with their own web space on the network - An area of relaxation for employees - Secure communication channel between users across public networks such as the Internet - A learning area for programming languages
answer
Secure communication channel between users across public networks such as the Internet
question
________ are applications designed to detect, log, and respond to unauthorized A. network or host use, both in real time and after the fact - Windows Operating System - Intrusion detection systems (IDS) - Firewalls - Twisted wire pairs
answer
Firewalls
question
Preventing physical access to a server by an unauthorized individual is the - Responsibility of the CFO of an organization - Primary security concern for a system administrator - An organization's least important concern - Reason we implement firewalls
answer
Primary security concern for a system administrator
question
Media can be divided into three categories: - Paper, plastic, cloth - Magnetic, optical, and electronic - Confidential, integrity, authority - Red, yellow, and blue
answer
Magnetic, optical, and electronic
question
________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate - Laser - Optical - Magnetic - Static
answer
Magnetic
question
________ are types of magnetic media. - CDR, CDRW, DVD - Linux, Windows, Oracle - Hard drives, diskettes, tape - Keyboards, mouse, monitor
answer
Hard drives, diskettes, tape
question
_______ are characterized by the use of a laser to read data stored on a physical device. - Authentication rules - FTP sites - Modems - Optical media
answer
Optical media
question
You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use connect them? - Hub - Router - Switch - Server
answer
Router
question
You are building a network and need to connect five computers in an office. They will be on the same network segment and you should be able to perform some security functions such as port address security. What device would you use to connect the computers? - Switch - Hub - Router - Server
answer
Switch
question
You are building a network and need to connect three different network segments, including the Internet. The device must enforce security policies and perform stateful packet filtering. The device you would use is a - Switch - Bridge - Router - Firewall
answer
Firewall
question
A hub operates at - Layer 1, the physical layer - Layer 2, the data link layer - Layer 2, the MAC layer - Layer 3, the network layer
answer
Layer 1, the physical layer
question
The following are steps in securing a workstation EXCEPT: - Install NetBIOS and IPX - Install antivirus - Remove unnecessary software - Disable unnecessary user accounts
answer
Install NetBIOS and IPX
question
Which operating system is immune to virus attacks? - Windows 7 - Red Hat Linux - Mac OS X - No operating system is immune
answer
No operating system is immune
question
Which device converts analog signals to digital signals and vice versa? - Switch - Hub - Modem - VPN
answer
Modem
question
What protocol is used to manage IP address space? - ICMP - DHCP - TCP - SNMP
answer
DHCP
question
Which of the following is an extension of the public telephone network into a business? - PBX - COTS - SNMP - SMTP
answer
PBX
question
Centralized monitoring of the health of the network is the function of a - File server - SNMP - NOC - TOC
answer
NOC
question
The intentions of computer virus writers have changed over the years, from wanting to simply spread a virus and be noticed, to the work of today's stealthy botnet-creating criminals. True or False
answer
True
question
Worms are software that attaches itself to a file and then executes on a machine. True or False
answer
False
question
Hubs are the most common device used for connecting computers on a local area network. True or False
answer
False
question
A bridge works on layer 3 of the OSI model. True or False
answer
False
question
Switches create one big collision domain for all connected devices. True or False
answer
False
question
Category 5 cable is rated for 10-Mbps Ethernet. True or False
answer
False
question
It is difficult to make precise connections with fiber optic cables, but they are inexpensive. True or False
answer
False
question
Infrared works like wireless in that it can penetrate walls. True or False
answer
False
question
SMTP is a protocol for managing functions between devices. True or False
answer
False
question
The most common implementation of VPN is via IPsec True or False
answer
True
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New