Security+ Network Security Fundamentals Chapter 8 & Chapter 7
telecommuter
A ______________ is a worker who work occasionally or regularly from a home office.
VPN Concentrator
A device that aggregates VPN connections
Switch
A device that connects network segments and forwards onlyl frames intended for that specific device or frames sent to all devices
Flood Guard
A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.
Stateful packet filtering
A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?
Layer 4
A load balancer that works with the File Transfer Protocol is operating at what layer of the OSI model?
Audit log
A log that is used to record which user performed an action and what that action was.
Virtualization
A means of managing and presenting computer resources by function without regard to their physical layout or location.
Heuristic monitoring
A monitoring technique used by an intrusion detection system (IDS) that uses an algorithm to determine if a threat exists
switch
A network _________________ isolates connected devices by learning MAC addresses and only sending frames intended for specific MAC addresses to the ports they're connected to, unless the MAC address is unknown.
reverse proxy
A server that routes incoming requests to a specific destination server, and acts as the final destination IP for all client access, is known as a:
Network address translation (NAT)
A technique that allows private IP addresses to be used on the public Internet.
Virtual LAN (VLAN)
A technology that allows scattered users to be logically grouped together even though they may be attached to different switches
Create a DMZ, add necessary hosts.
A web server must be accessible to untrusted outside users. What can be done to isolate this host and any additional hosts with similar requirements from more secured hosts on a network?
log
A(n) ____________________ is a record of events that occur.
Load balancing
An administrator has two servers that host the same web content, but only one server is utilized at a given time. What can be configured to make use of both servers in a manner that is transparent to the end users?
21
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
hub
An early networking device that functioned at layer 1 of the OSI model and added devices to a single segment is known as which of the following choices?
Application-aware IPS
An intrusion prevention system that knows information such as the applications that are running as well as the underlying operating systems
Network Layer
At what level of the OSI model does the IP protocol function
True
Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.
802.1d
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?
BIND
DNS poisoning can be prevented using the latest edition of what software below?
True
Defense in depth, or layered security, involves the use of multiple types of network hardware within a network.
True
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.
VLAN
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
True
IEEE 802.1x is commonly used on wireless networks.
False
IP telephony and Voice over IP (VoIP) are identical.
Cloud Infrastructure as a Service
In what type of cloud computing does the customer have the highest level of control?
content
Internet ____________________ filters monitor Internet traffic and block access to pre-selected Web sites and files.
IEEE 802.1x
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
Malware inspection
Searching for malware in incoming web content
Content inspection
Searching incoming web content to match keywords
True
Security is enhanced by subnetting a single network into multiple smaller subnets in order to isolate groups of hosts.
DNS
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
Network
Select below the layer of the OSI model at which the route a packet is to take is determined, and the addressing of the packet is performed.
Web security gateway
Select below the technology that can be used to examine content through application-level filtering:
False
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
False
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Loop protection
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA)
False
The OSI model breaks networking steps down into a series of six layers.
Fibre Channel (FC)
The ____________ is a high-speed storage network protocol that can transmit up to 16 gigabits per second.
Physical
The ____________________ Layer is omitted in the TCP/IP model.
ICMP
The capability for devices to exchange low-level control messages is provided by what protocol below?
flood guard
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:
Create a VLAN and add the users' computers / ports to the VLAN.
The management in your corporate office want to group users on the network together logically even though they are attached to separate network switches. How can this be done?
4
The standard TCP/IP protocol uses IP addresses which are how many bytes in length?
protocol analyzer
The traffic sent by devices connected to a hub can be captured and decoded by a _________________.
router
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
proxy server
What is the name for a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?
system call
What is the name for an instruction that interrupts a program being executed and requests a service from the operating system?
Supplicant
What is the term used for a device that requests permission from an authenticator to join a network?
router
What kind of networking device forwards packets across different computer networks by reading destination addresses?
Session
What layer of the OSI model is responsible for permitting two parties on a network to hold ongoing communications across the network?
TCP/IP
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
VPN
What technology enables authorized users to use an unsecured public network, such as the Internet, as if were a secure private network?
NetBIOS
What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?
Signature
What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
802.1Q
What vendor neutral protocol implements support for VLAN tagging?
NAT
When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?
hypervisor
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
community string
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
Transport Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?
172.63.255.0
Which network address below is not a private IP address network?
Decreased network utilization
Which of the following is not a benefit that can be provided by using IP telephony?
Cloud Software as a Service
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
host
With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.
False
Workgroup switches must work faster than core switches.
Network address translation (NAT)
_________________ is a technique that allows a private IP addresses to be used on the Internet with a single public IP address.
Cloud
____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
FTP Secure (FTPS)
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
Router
A device that can forward packets across computer networks
Application-aware firewall
A firewall that can identify the applications that send packets through the firewall and then make decisions about the applications
Snapshot
An instance of a particular state of a virtual machine that can be saved for later use.
Telnet
An older TCP/IP protocol and an application used for text-based commmunication
File Transfer Protocol (FTP)
An unsecure TCP/IP protocol that is commonly used for transferring files
Event log
Log that documents any unsuccessful events and the most significant successful events.
Host elasticity
The ability to easily expand or contract resources in a virtualized environment.
Sticky
What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?
Intent
Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?