1D7XX - Cyber Defense Operations (UGT)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How many devices are supported in a daisy-chain configuration when using thunderbolt cables?

6

Which switch port security initiative is referred to as port-based network access control (PNAC)?

802.1X

What best describes the Daubert standard?

A standard for evidence in US Federal courts

Which component of Amazon Web Services allows you to connect to your on-premises applications and services?

AWS Storage Gateway

Given the data center network topology, where is security defined?

Access switches

A hybrid network topology is created by combining which other topologies?

Any combination of two or more topologies of any type

The use of a smartjack provides which capabilities for a demarcation point?

Diagnostic and monitoring

Which type of video interface uses packetized data transmissions?

DisplayPort

With physical incidents what id the most important issue?

Safety

A DDoS attack would most accurately be described as a ___?

Service interruption

Which scenario would best warrant the implementation of a RADIUS server?

When you have multiple network access servers, with a single authentication policy

Select the most current Wi-Fi standard available.

- 802.11n - 802.11ac - 802.11ar

You have been tasked with setting up a network for mobile laptop users. These users could potentially move from location to location from with inside of your companies build. Which of the following devices should be deployed? (Choose two)

- Access point - WLAN Controller

How many connections are needed to connect 6 devices in a mesh topology assuming only a single connection between any two devices?

15

Which specialty appliance would be used to make SSH2 connections to a backend database or directory service to perform secure dedicated management and administration as opposed to direct connections?

Bastion host

Which of the following terms best describes a network that spans multiple buildings?

CAN

Match the topology to its description.

- Star - Host connected to a backbone - Mesh - Hosts connected to each other forming a circle - Ring - Hosts connected to a central device - Bus - Hosts connected to each other

Which characteristic of a switch distinguish it from a hub?

- Switches forward traffic based on the MAC address - Switches operate at layer 2 of the OSI model, hubs operate at layer 1

Category 5 cable is limited to what transmission speed?

100 Mbps

What is a suite of tools used to identify and report on fraudulent, illegal, or other undesirable behavior concerning data in transit or at rest?

DAM

If you needed to convert between digital and analog video, which adapter would be required?

DVI - VGA

What function does the shielding provide in Shielded Twisted Pair cabling?

More resistance to interference

Routers operate at which layer of the OSI model?

Network

A range extender is the wireless equivalent to which wired device?

Repeater

A persistent VPN that is established between two physical locations such as a branch office to headquarters with VPN concentrators on both ends is an example of which type of VPN?

Site-to-site

In which scenario would you implement a modem?

To connect a host to the Internet over a phone line

What are the two most significant benefits of implementing a hybrid cloud solution for a backup and recovery strategy?

- Scalability - Accessibility

Which service level offering within the Google Cloud Platform would be most appropriate for data that is accessed the least often?

Archive

Which of these IPsec protocols offers additional confidentiality services?

ESP

Satellite internet service has which primary advantage over most other types of services?

Global availability

What prevents undesirable traffic from crossing network boundaries created in the campus area network?

Firewall

Which type of network would typically be used to cover very large geographical areas such as from country to country?

WAN

Which of these protocols is commonly load balanced?

- TCP - HTTP - TLS - UDP

Which characteristics of a bridge distinguish it from a switch?

- Bridges can connect dissimilar architectures - Switches connect host systems together, bridges connect network segments - Bridges can connect dissimilar types of media

Match the networking services with the correct networking architecture tier.

- Distribution - Apply filtering and routing policies - Core - Provide high speed backbone networking - Access - Apply network access policies

Which are operational modes in which a Cisco access point can operate in?

- FlexConnect mode - Rogue mode - Local mode - Monitor mode

Match the Cisco access point mode to its operational characteristic

- IDS, location-based services - Monitor mode - Used for meshing - Bridge mode - Allows AP to switch to VLAN operation - FlexConnect mode - Detects rogue access points - Rogue mode - Unstable or slow WANs - FlexConnect mode - Known as foundational mode - Local mode

A load balancer can provide which networking features?

- Improved performance and availability by ensuring servers do not become overwhelmed - Even distribution of traffic across servers performing the same function

Which describes Cisco access points?

- Lightweight Aps are known as intelligent APs - Omni directional is a type of integrated AP antenna - Autonomous APs are known as thick clients

Which types of conversions can be performed by media converters?

- Multi-mode fiber to single mode fiber - Electrical signals (copper wire) to light signals (fiber optic)

Given the position of the campus network, what are some key security goals that need to be defined?

- Network infrastructure protection - Endpoint protection

Based on the graphic, if node 1 of this ring network topology goes down, what happens to communication on the rest of the network?

All nodes will lose connectivity

Which type of backup might be the best implemented to use with personally owned devices to minimize the impact on users?

Continuous incremental backups

In which scenario would you be most likely to use a tone generator/ probe?

Determining the termination point of a cable

In a bus network topology, by which means do systems connect to each other?

Each systems connects to adjacent systems only in a linear fashion

Configuring radio balancing in a wireless controller refers to which feature?

Ensuring that all 802.11n clients are connected to 802.11n access points

What is a network with resources under the control of another organization such as a strategic partner in which your organization also needs access?

Extranet

In which scenario would you be most likely to use a loopback plug?

Suspected issues with your local network interface port

Given the campus area network, what are the security measures that can be defined?

- Port security - VLANs - ACLs

In a start topology, by which means do systems connect to each other?

All systems connect to a central connection device

What network topology is a compromise between redundancy and cost?

Hybrid

Which types of wireless access points might be used by an attacker to gain access to confidential information?

- Rogue - Evil twin

Match the virtual network topology service to its characteristic.

- Sandboxed environment - PaaS - You provide security for devices - IaaS - Vendor protects others from your devices - IaaS - Vendor control software and security - SaaS - Protects against interfering with other tenants - PaaS

Which security functions can be performed by a proxy server?

- Shielding internal addresses from the public Internet - Packet examination and filtering

What components are common within the virtual topology?

- Storage hardware - Host - Hypervisor software

Which transmission characteristics would best describe the properties of serial peripheral cables?

- Transmits more effectively over longer distances - Transmits a single bit at a time - Generally used for small data transfers

Put the Access Point states in order of occurrence where the WLC delivers the configuration to the AP.

- WLC discovery and DHCP option 48 - 2 - WLC join - 4 - Access point boots - 1 - Download IOS image and config - 5 - CAPWAP - 3 - Run state - 6

What can cause interference within the wireless network?

- Baby monitors - Cordless phones - Radar - Microwaves - Neighbors

Which of the following are characteristics of a VoIP gateway?

- Billing - Voice and fax compression - Packetization

Identify the bands and channels most used in wireless networking?

- Channel 6 - 5.0 GHz - Channel 11 - Channel 1 - 2.4 GHz

A multimeter can help to ascertain which properties of a cable?

- Continuity - Resistance

Which additional services are inherently available in Azure to enhance the security of your backups to further protect against unauthorized access?

- Encryption - Multi-factor authentication

Which features of a cable would an advanced cable tester be able to determine that a basic tester could not?

- Interference - Attenuation - Resistance

Which options represent the benefits of onsite backup storage compared to offsite?

- No internet access required - Immediate access - Less expensive

A Wi-Fi analyzer can be used to determine which properties of wireless signals?

- Optimal channel use - Signal strength - How often transmission errors are encountered

Which device interface would be required if you wanted to install six hard drives into a server that were all using the same cable?

SCSI

Which statement would best characterize the route that packets will take when using multiprotocol label switching?

Dedicated or specified

A wired network that is implemented in your home or a small office would be most appropriately categorized as which type of network?

PAN

What virtual network topology service has a sandboxed environment?

Platform as a service

An IPS provides what service?

Reads signatures to drop packets that appear to be an attack

For which device would you use a Lighting cable?

iPhone 5

What is the most important reason to engage stakeholders in recovery?

To get their input on recovery prioritization

From a perspective of the cultural impact, which option would generally not be a consideration when attempting to plan a migration to the cloud?

Which provider to use

A multi-layered switch operates over which 2 layers?

2 and 3

Which USB specification introduced a transfer rate of 480 Mbps?

2.0

Which statement best describes a Unified Threat Management device?

An all-in-one security device

Given the small office/home office (SOHO) network topology, what component provides a tunnel through the internet?

VPN

A workgroup is best described in which manner?

A Microsoft implementation of a peer-to-peer network

The 3-2-1 strategy of storing backups means that there should be how many copies in total?

3

In a networking environment with a corporate headquarters, and four branch offices, how many tunnel interfaces would need to be configured at each location so that each branch could connect to the headquarters, and to each other if using multipoint generic routing encapsulation?

5

The typical Cisco hierarchical network model consists of three layers. Which statement best describes the functions performed at the distribution layer?

Acts as the interface between the core and access layers

If a single link between system A and system B were to fail in a full mesh network with 5 nodes, how would it affect overall communications on the network?

All communication among all nodes would still be possible

In which scenario would you be most likely to use a crimper?

Attaching a connector to a cable end

Content filtering uses which primary method to screen objectionable content?

Character strings

Which category of cable would be appropriate for an Ethernet network that requires speeds of up to 10 Gbps over distances of 100 meters?

Cat 6A

Which of the following is a cornerstone of all forensics?

Chain of custody

What architecture used by many small and medium-sized networks eliminates the traditional top tier entirely?

Collapsed Core

Which type of network provider service was available in both asynchronous and synchronous modes?

DSL

A SAN would typically be implemented in which type of networking environment?

Enterprise-level- organization

Where would you configure access control lists in the campus area network?

Firewall

Which device's primary purpose is to divide the network into trusted and untrusted areas?

Firewall

What type of device establishes a barrier between a trusted, secure internal network and another outside network?

Firewalls

Which coaxial cable limitation is best described as power being transmitted by the braided shielding?

Ground loop

A software firewall running on a Windows 10 PC is an example of which type of firewall?

Host-based

What is the first step in incident response?

Identification

What is the most important issue with cyber incident response, after the system is restored to normal operation?

Improve security

Which device is able to stop activity that is considered to be suspicious based on historical traffic patterns?

Intrusion Prevention System

Which statement best characterizes the purpose and functionality of a virtual switch?

It allows virtual machines to communicate with the other systems on the real systems on the real network

What problem arises because of failure to design network architecture with the ability to scale up?

Lack of capacity within a single device

Identify the common reason why an after-action review is not successful.

Not enough information about the incident to make conclusions

Given the small office/ home office (SOHO) network topology, what provides an approved list of accepted devices that can be used?

Policies

In which scenario would you be most likely to use a cable stripper?

Preparing for cable crimping

In which scenario would you be most likely to use a punch down tool?

Pressing individual cable wires down into connections at the back of a patch panel

Which of these mitigating features on a WAF WebACL will look for attackers attempting to modify the back-end database of a front-end web server?

SQL injection

Which type of fiber optic cabling would be most appropriate to use to connect two branch offices that are many miles apart?

Single Mode

What virtual network topology service requires the vendor to control the software and security?

Software as a service

If you have a Full backup from Monday, and Differential backups on Tuesday through Thursday, if a failure occurs on Friday, which backups are required to fully restore all data?

The Full from Monday, and the Differential from Thursday

VoIP phones make use of which transmission media?

The Internet

Which device could be classified as a next generation firewall?

UTM


Set pelajaran terkait

Section 7 - Sales Comparison, Cost and Income Approaches

View Set

Among the Hidden Chapter 6-10 Review

View Set

Accounting Chapter 11 Review Questions

View Set