unit 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

How many subnets can a /48 site prefix support?

65,536 subnets

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

Polymorphic malware can change its characteristics every time it is transferred to a new system.

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

nessus

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term

principal of least privilege.

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

quid pro quo

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

sha256sum

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA)

true

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

vpn gateway

Which of the following suggestions can help prevent VLAN hopping attacks on a network

Disable auto trunking and move native VLANs to unused VLANs.

Which statement regarding the IKEv2 tunneling protocol is accurate?

IKEv2 offers fast throughput and good stability when moving between wireless hotspots.

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

It is inserted between the source address and the Ethernet type field

When is it appropriate to utilize the NAT network connection type?

Whenever the VM does not need to be access at a known address by other network nodes.

Which of the following scenarios would necessitate the use of a non-disclosure agreement?

Your company needs to prevent a new contractor from sharing information with a potential competitor.

What is NOT one of the ways in which networks are commonly segmented

by device manufacturer

a hacker, in the original sense of the word, is someone with technical skill and malicious intent

false

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

false


Ensembles d'études connexes

Safety and Firearms Care Introduction

View Set

Chapter 23; Digestive System A&P

View Set

Intro, Strategy & Math (Altius MCAT Prep)

View Set

6.1 Professional Ethics & Chapter 6 Quiz

View Set

ADV. Corporate Finance- Spring 2021

View Set

chapter 19 nursing of the family during postpartum care

View Set

Ch. 14 Research Synthesis (Meta-Analysis)

View Set