Capston Test 3
A best practice for compliance in the WAN Domain is to establish a single wide area network (WAN) connection to avoid conflicts with multiple connections.
False
A demilitarized zone (DMZ) defines the rules a connecting node must meet to establish a secure connection with your network.
False
An intrusion detection system (IDS) is a server deliberately set up as insecure in an effort to trap or track attackers.
False
What is meant by network access control (NAC)?
It defines the rules a connecting node must meet to establish a secure connection with your network.
The hardware devices that connect other devices and computers using connection media are known as?
Networking Devices
At which layer of the OSI reference model do most wide area network (WAN) protocols operate?
OSI Layer 2
The hardware that provides one or more services to users, such as server computers, printers, and network storage devices, are known as?
Server computers and services devices
Penetration tests are ________.
Simulations of attacks
Unshielded twisted pair (UTP) is not susceptible to interference.
False
In an access control system in which a user is being identified, authenticated, and authorized, what is the subject?
User
Which of the following is NOT a common method of maximizing C-I-A in the LAN-to-WAN Domain?
Configure a single ISP Connection
Which of the following is NOT typically a LAN Domain component?
Connection Media, Networking Devices, Server computers & service devices, networking services software are LAN domain components.
Of the following, what is the best method of maximizing confidentiality in the Workstation Domain?
Encryption
What is the primary type of control used to protect data in the WAN Domain?
Encryption
Which of the following is NOT a form of authentication?
Encryption
A best practice for compliance in the WAN Domain is to implement load balancing on multiple wide area network (WAN) connections.
True
A physical server on a LAN requires a hard disk, a network interface, and software to provide network access to files and folders on the attached disks.
True
A security control in the LAN Domain is anti-malware software.
True
C-I-A is the confidentiality, integrity, and availability properties that describe a secure object
True
Encryption takes cleartext data and turns it into ciphertext through the use of an algorithm and a key.
True
In the LAN Domain, _________________ provides the interface between the hardware and the Application Layer software
network operating system (NOS)
A service level agreement (SLA) signifies that a service organization has had its control objectives and control activities examined by an independent auditing firm.
False
Comparing 802.11ac, 802.11g, and 802.11n, 802.11g offers the fastest maximum speed.
False
Multiprotocol Label Switching (MPLS) is a local area network protocol.
False
Shielded twisted pair (STP) cabling is immune to radio and electrical interference and transfers data at extremely high speeds.
False
The overall purpose of authentication requirements is to enforce the basic pillars or tenets of security.
False
The purpose of a demilitarized zone (DMZ) is to maintain two connections to an Internet service provider (ISP) for redundancy.
False
The term virtual private network (VPN) describes an environment in which the components that make up an application reside on different computers.
False
IEEE 802.11 describes a standard for wireless LAN (WLAN) communication protocols
True
Multifactor authentication increases the strength of any form of authentication.
True
Network access control (NAC) enables you to check a client computer for compliance with security policies and either grant or deny its access to the internal network.
True
One method of maximizing availability in the LAN Domain is to create secondary copies, or backups, of data in case the primary copy is damaged or deleted.
True
Secure virtual private networks (VPNs) are VPNs in which all traffic is encrypted.
True
Service Organization Control (SOC) report 1 is based on "Statement on Standards for Attestation Engagements (SSAE) No. 16," formerly known as SAS 70.
True
Shielded twisted pair (STP) cabling is similar to unshielded twisted pair (UTP) but with foil shielding around each pair.
True
The Telecommunication Standardization Sector (ITU-T) is an organization that produces global telecommunications standards.
True