Quiz3 Princ and Prac
When adding a new Active Directory group via the PowerShell command line interface, the ________ option specifies the group to which you want to add user account(s).
-Identity
When adding a new Active Directory user through a PowerShell cmdlet, the ________ option specifies the name of the user object in Active Directory.
-Name
In Wireshark, which of the following Protocol column filters would display only packets transported over a wireless network?
802.11
When examining data in Wireshark, the presence of ________ in the Packet List pane indicates that the data comes from a wireless network.
Beacon frames
Miriam is a network administrator. She would like to use a wireless authentication technology similar to that found in hotels where users are redirected to a webpage when they connect to the network. What technology should she deploy?
Captive portal
Arturo is a network engineer. He wants to implement an access control system in which the owner of the resource decides who can change permissions, and permission levels can be granted to specific users, groups of people in the same or similar job roles, or by project. Which of the following should Arturo choose?
Discretionary access control (DAC)
Which of the following is not a defining aspect of using TCP as a connection-oriented protocol?
Encryption of packet payload
Administrators can use Active Directory in conjunction with ________ to enforce security policies surrounding passwords, antivirus, software updates, and more.
Group Policy
Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?
Infrastructure as a Service (IaaS)
Maria is a freelance network consultant. She is setting up security for a small business client's wireless network. She is configuring a feature in the wireless access point (WAP) that will allow only computers with certain wireless network cards to connect to the network. This feature filters out the network cards of any wireless computer not on the list. What is this called?
Media Access Control (MAC) address filtering
Isabella is a network engineer. She would like to strengthen the security of her organization's networks by adding more requirements before allowing a device to connect to a network. She plans to add authentication to the wireless network and posture checking to the wired network. What technology should Isabella use?
Network access control (NAC)
The Link Layer in the TCP/IP Model corresponds to the ________ and ________ Layers of the OSI Reference Model.
Physical; Data Link
The ________ make(s) a storage device available for remote users to use as a local disk drive.
SMB share
There are a large number of protocols and programs that use port numbers to make computer connections. Of the following, which ones do not use port numbers?
Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
What is an example of two-factor authentication (2FA)?
Smart card and personal identification number (PIN)
True or False? Another name for a border firewall is a demilitarized zone (DMZ) firewall.
false
True or False? Kerberos is an example of a biometric method.
false
True or False? The four central components of access control are users, resources, actions, and features.
false
True or False? The ping utility identifies the path that packets travel through a network.
false
Wireshark can be filtered to show ________ data by applying the ________ filter.
ping; TCP
Giving HR managers full control access to files in a folder called HR Policies while giving HR representatives read-only access to the files in the same HR Policies folder is an example of ________ access controls.
role-based
A ________ is used to identify the part of an Ethernet network where all hosts share the same host address.
subnet mask
True or False? A Chinese wall security policy defines a barrier and develops a set of rules to ensure that no subject gets to objects on the other side.
true
True or False? A protocol is a set of rules that govern the format of messages that computers exchange.
true
True or False? A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.
true
True or False? A wireless access point (WAP) is the connection between a wired network and wireless devices.
true
True or False? Authentication by action is based on something you do, such as typing.
true
True or False? Content-dependent access control requires the access control mechanism to look at the data to decide who should get to see it.
true
True or False? Log files are one way to prove accountability on a system or network.
true
True or False? Single sign-on (SSO) can provide for greater security because with only one password to remember, users are generally willing to use stronger passwords.
true