8-10

¡Supera tus tareas y exámenes ahora con Quizwiz!

At what layer of the OSI model do proxy servers operate? Layer 3 Layer 2 Layer 7 Layer 4

7

feature of Windows Server allows for agentless authentication? AD (Active Directory) ACL (access control list) IDS (intrusion detection system) Network-based firewall

AD (Active Directory)

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+? Authentication Authorization Access control Accounting

Access control

What software might be installed on a device in order to authenticate it to the network? Operating system Security policy NAC (network access control) Agent

Agent

Which of the following features is common to both an NGFW and traditional firewalls? Application Control IDS and/or IPS User awareness User authentication

User authentication

Which formulas can be used to calculate the magic number? Choose two. a. 256 - the interesting octet b. 2 h - 2 c. 2 n d. 2 h

a. 256 - the interesting octet

A. DHCP relay agent b. DHCP server c. Hypervisor d. Virtual router

a. DHCP relay agent

Active Directory and 389 Directory Server are both compatible with which directory access protocol? a. LDAP b. RADIUS c. Kerberos d. AES

a. LDAP

APhishing b. Baiting c. Quid pro quo d. Tailgating

a. Phishing

access-list acl_2 deny tcp any any access-list acl_2 permit http any any access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www access-list acl_2 permit icmp any any

access-list acl_2 permit icmp any any

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet? a. None b. Eight c. Nine d. Ten

b. Eight

A. Principle of least privilege b. Insider threat c. Vulnerability d. Denial of service

b. Insider threat

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? a. Ransomware b. Logic bomb c. Virus d. Worm

b. Logic bomb

A. AUP b. NDA c. MDM d. BYOD

b. NDA

What do well-chosen subnets accomplish? a. IP address spaces overlap for easier management. b. Network documentation is easier to manage. c. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. d. Problems affect the entire network, making them more difficult to pin down

b. Network documentation is easier to manage.

Which of the following is considered a secure protocol? a. FTP b. SSH c. Telnet d. HTTP

b. SSH

What kind of attack simulation detects vulnerabilities and attempts to exploit them? A. Red team-blue team exercise b. Vulnerability scanning c. Security audit d. Penetration testing

b. Vulnerability scanning

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port? a. mac-limit b. switchport port-security c. storm-controld. d. shutdown

b. switchport port-security

How many bits of a Class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits

c. 24 bits

2. Which type of DoS attack orchestrates an attack using uninfected computers? a. DDoS (Distributed DoS) attack b. Spoofing attack c. DRDoS (Distributed Reflection DoS) attack d. PDoS (Permanent DoS) attack

c. DRDoS (Distributed Reflection DoS) attack

Which of these attacks is a form of Wi-Fi DoS attack? a. Rogue DHCP server b. FTP bounce c. Deauthentication attack d. Amplified DRDoS attack

c. Deauthentication attack

7. Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The first one b. The third one 3 c. The fourth one d. The eighth one

c. The fourth one

Which of the following is not a good reason to segment a network? a. To limit access to broadcast domains b. To reduce the demand on bandwidth c. To increase the number of networking devices on a network d. To narrow down the location of problems on a network

c. To increase the number of networking devices on a network

2. What is the formula for determining the number of possible hosts on a network? a. 2 n = Y b. 2 n - 2 = Y c. 2 h = Z d. 2 h - 2 = Z

d. 2 h - 2 = Z

Which IEEE standard determines how VLANs work on a network? a. 802.1x b. 802.11 c. 802.3af d. 802.1Q

d. 802.1Q

Which NGFW feature allows a network admin to restrict traffic generated by a specific game? a. Content filter b. User awareness c. Context awareness d. Application awareness

d. Application awareness

A spoofed DNS record spreads to other DNS servers. What is this attack called? A. ARP poisoning b. DHCP snooping c. MitM attack 3 d. DNS poisoning

d. DNS poisoning

Data breach b. Security audit c. Exploitation d. Posture assessment

d. Posture assessment

Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Console b. Ethernet c. Access d. Trunk

d. Trunk


Conjuntos de estudio relacionados

GEO 115 Chapters 1-4 Study Guide

View Set

TJC US History Chapter 27, TJC US History Chapter 28

View Set

NC Life Insurance Practice Exam Questions

View Set

Lewis 10th Chapter 58 Chronic Neurologic Problems Evolve NCLEX practice

View Set

Chapter 42 mastering bio questions

View Set