Networking Chapter 10 Security in Network Design
What feature of Windows Server allows for agentless authentication? a. AD (Active Directory) b. ACL (access control list) c. IDS (intrusion detection system) d. Network-based firewall
AD (Active Directory)
Active Directory and 389 Directory Server are both compatible with which directory access protocol? a. LDAP b. RADIUS c. Kerberos d. AES
LDAP
Which of the following is not one of the three AAA services provided by RADIUS and TACACS1? a. Authentication b. Authorization c. Access control d. Accounting
access control
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? a. access-list acl_2 deny tcp any any b. access-list acl_2 permit http any any c. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www d. access-list acl_2 permit icmp any any
access-list acl_2 permit http any any
What software might be installed on a device in order to authenticate it to the network? a. Operating system b. Security policy c. NAC (network access control) d. Agent
agent
Which NGFW feature allows a network admin to restrict traffic generated by a specific game? a. Content filter b. User awareness c. Context awareness d. Application awareness
application awareness
What kind of firewall blocks traffic based on application data contained within the packets? a. Host-based firewall b. Content-filtering firewall c. Packet-filtering firewall d. Stateless firewall
content-filtering firewall
At what layer of the OSI model do proxy servers operate? a. Layer 3 b. Layer 2 c. Layer 7 d. Layer 4
layer 7
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port? a. mac-limit b. switchport port-security c. storm-control d. shutdown
switchport port-security
Which of the following features is common to both an NGFW and traditional firewalls? a. Application Control b. IDS and/or IPS c. User awareness d. User authentication
user authentication