Network+ Quiz 7 & 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software? a. mobile device management software b. software defined network software c. virtual device management software d. cloud network management software

A. mobile device management software

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? a. L2TP b. TLS c. IPsec d. SSL

C. IPsec

In a red team-blue team exercise, what is the purpose of the blue team? a. The blue team is tasked with attacking the network. b. The blue team must observe the actions of the red team. The blue team is charged with the defense of the network. d. The blue team consists of regulators that ensure no illegal activity is undertaken

C. The blue team is charged with the defense of the network.

What document addresses the specific concerns related to special access given to administrators and certain support staff? a. non-disclosure agreement b. acceptable use policy c. password policy d. privileged user agreement

D. privileged user agreement.

what is NOT a potential disadvantage of utilizing virtualization? a. Multiple virtual machines contending for finite resources can compromise performance. b. Increased complexity and administrative burden can result from the use of virtual machines. c. Licensing costs can be high due to every instance of commercial software requiring a separate license. d. virtualization software increases the complexity of backups, making creation of usable backups difficult.

D. virtualization software increases the complexity of backups, making creation of usable backups difficult.

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? a.VPN proxy b.VPN server c.VPN transport d.VPN gateway

D. vpn gateway

A drop ceiling could be used by an intruder to gain access to a secured room.. T/F

True

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate? a. VNC is faster than Remote Desktop, and requires less network bandwidth. b. VNC is open source, allowing companies to develop their own software based on VNC. c. VNC uses the Remote Desktop Protocol (RDP). d. VNC is a standard developed by Microsoft and used by Windows Remote Desktop

VNC is open source, allowing companies to develop their own software based on VNC

A hacker, in the original sense of the word, is someone with technical skill and malicious intent.. T/F

false

Different types of organizations have similar levels of network security risks. T/F

false

The original version of the Secure Hash Algorithm was developed by MIT.. T/F

false

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).. T/F

true

Over a long-distance connection, using SSH keys is more secure than using passwords.. T/F

true

PPP can support several types of Network layer protocols that might use the connection.. T/F

true

The term malware is derived from a combination of the words malicious and software.. T/F

true

Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection. T/F

true.

VMware Player and Linux KVM are both examples of what type of hypervisor? A. type I hypervisor b. Type 2 hypervisor c.barebones hypervisor d. bare-metal hypervisor

B. Type2 hypervisor

How often should you require users to change their passwords? a. every 30 days b. every 60 days c. every 90 days d. every 120 days

B. every 60 days

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware? a. encrypted virus b. logic bomb c. boot sector virus d. worm

B. logic bomb

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes? a. Nessus b. metasploit c. nmap d. Sub7

B. metasploit

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices? a. laaS b. SaaS c. XaaS d. PaaS

B. saas

In the typical social engineering attack cycle, what occurs at Phase 3? a. The attacker researches the desired target for clues as to vulnerabilities. b. The attacker builds trust with the target and attempts to gain more information. c. the attacker exploits an action undertaken by the victim in order to gain access. d. The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion

C. the attacker exploits an action undertaken by the victim in order to gain access.

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate? a. PPP can negotiate and establish a connection between two endpoints. b. PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client. c. PPP can support several Network layer protocols, such as IP, that might use the connection. (9PP can support strong encryption, such as AH or ESP. D. PPP can support strong encryption, such as AH or ESP.

D. PPP can support strong encryption, such as AH or ESP.

What statement regarding the different versions of the SHA hashing algorithm is accurate? a. SHA-0 is the most secure version of SHA. b. SHA-I supports a 128-bit hash function. c. SHA-2 only supports a 256-bit hash. d. SHA-2 and SHA-3 both support the same hash lengths

D. SHA-2 and SHA-3 both support the same hash lengths

what open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked? a. Layer 2 Tunneling Protocol (L2TP) b. Point-to-Point Tunneling Protocol (PPTP) c. Generic Routing Encapsulation (GRE) d. OpenVPN

D. openvpn


Conjuntos de estudio relacionados

Chapter 9 Review Questions (Unemployment)

View Set

Intro to Computer Programming- Data Types, Operators, and Expressions(Part 2)

View Set

ATI Dosage Calculations Critical Care Medications 2nd

View Set

MIDTERM 2 - From Prejudice to Discrimination (3)

View Set

ATI - RN Nutrition Online Practice 2019 A

View Set

PMP 24 Quiz - Managing Procurement during Your Project

View Set

Structural Classification of Joints

View Set

Neurological Communication Disorders Exam 2

View Set