Quiz3 Princ and Prac

¡Supera tus tareas y exámenes ahora con Quizwiz!

When adding a new Active Directory group via the PowerShell command line interface, the ________ option specifies the group to which you want to add user account(s).

-Identity

When adding a new Active Directory user through a PowerShell cmdlet, the ________ option specifies the name of the user object in Active Directory.

-Name

In Wireshark, which of the following Protocol column filters would display only packets transported over a wireless network?

802.11

When examining data in Wireshark, the presence of ________ in the Packet List pane indicates that the data comes from a wireless network.

Beacon frames

Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?

Captive portal

Arturo is a network engineer. He wants to implement an access control system in which the owner of the resource decides who can change permissions, and permission levels can be granted to specific users, groups of people in the same or similar job roles, or by project. Which of the following should Arturo choose?

Discretionary access control (DAC)

Which of the following is not a defining aspect of using TCP as a connection-oriented protocol?

Encryption of packet payload

Administrators can use Active Directory in conjunction with ________ to enforce security policies surrounding passwords, antivirus, software updates, and more.

Group Policy

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Infrastructure as a Service (IaaS)

Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called?

Media Access Control (MAC) address filtering

Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?

Network access control (NAC)

The Link Layer in the TCP/IP Model corresponds to the ________ and ________ Layers of the OSI Reference Model.

Physical; Data Link

The ________ make(s) a storage device available for remote users to use as a local disk drive.

SMB share

There are a large number of protocols and programs that use port numbers to make computer connections. Of the following, which ones do not use port numbers?

Secure Sockets Layer (SSL) or Transport Layer Security (TLS)

What is an example of two-factor authentication (2FA)?

Smart card and personal identification number (PIN)

True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.

false

True or False? Kerberos is an example of a biometric method.

false

True or False? The four central components of access control are users, resources, actions, and features.

false

True or False? The ping utility identifies the path that packets travel through a network.

false

Wireshark can be filtered to show ________ data by applying the ________ filter.

ping; TCP

Giving HR managers full control access to files in a folder called HR Policies while giving HR representatives read-only access to the files in the same HR Policies folder is an example of ________ access controls.

role-based

A ________ is used to identify the part of an Ethernet network where all hosts share the same host address.

subnet mask

True or False? A Chinese wall security policy defines a barrier and develops a set of rules to ensure that no subject gets to objects on the other side.

true

True or False? A protocol is a set of rules that govern the format of messages that computers exchange.

true

True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

true

True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.

true

True or False? Authentication by action is based on something you do, such as typing.

true

True or False? Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.

true

True or False? Log files are one way to prove accountability on a system or network.

true

True or False? Single sign-on (SSO) can provide for greater security because with only one password to remember, users are generally willing to use stronger passwords.

true


Conjuntos de estudio relacionados

Failed Practice Permit Test Questions

View Set

The Baroque in Italy and Spain- BU Chap 24

View Set

Full Blast Plus 6 for Ukraine Hello Module p.4 Months, days, seasons

View Set

Term 2 Final Exam Review | Pharmacology & Medical Surgery (66 items) sereia

View Set