Network + Chapter 7,8,9
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
DirectAccess
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?
MCU
What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?
MPLS
Which QoS technique operates at the OSI layer "2.5"?
MPLS
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
Natas
At what layer of the OSI model do firewalls operate?
Network
What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?
PCI DSS
Which remote access protocol is used over an Ethernet network?
PPPoE
On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?
SS7
RTP and RTCP operate at which layer of the OSI model?
Application layer
What kind of virus runs in place of the computer's normal system files?
Boot sector viruses
What kind of vulnerability is exploited by a ping of death?
Buffer overflow
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Citrix Xen
What of the following features does not distinguish an NGFW from traditional firewalls?
UTM (Unified Threat Management)
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
FCS
In H.323, which protocol below handles call or videoconference signaling?
H.225
What federal organization sets strict standards to protect the privacy of patient records?
HIPAA
When using public and private keys to connect to an SSH server, where must your public key be placed?
In the authorized keys file on the host where the SSH server is
What wireless attack might a potential hacker execute with a specially configured transmitter?
Jamming
Which tunneling protocol is accepted and used by multiple vendors?
L2TP
At what layer of the OSI model do proxy servers operate?
Layer 7
What authentication protocol sends authentication information in cleartext without encryption?
PAP
Which cloud computing service model gives software developers access to multiple operating systems for testing?
PaaS
What port do SNMP agents listen on?
Port 161
In public key encryption, which key is used to decrypt the message?
Private key
What option below is not an encryption algorithm method that is used by SSH?
SHA-2
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
SIEM system
A reflective attack can be increased in intensity by combining it with what type of attack?
amplification attack
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?
banner-grabbing attack
What feature on some network switches can be used to detect faked arp messages?
dynamic ARP inspection
A SecurID key chain fob from RSA security generates a password that changes how often?
every 60 seconds
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
honeynet
The combination of a public key and a private key are known by what term below?
key pair
Packets that are smaller than a medium's minimum packet size are known by what term below?
runts
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?
smurf attack
What command retrieves the next record in an SNMP log?
snmpgetnext
What utility in Linux provides standards for generating, storing, and processing messages about events on a system?
syslog
In a VoIP call, what method of transmission is used between two IP phones?
unicast
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?
user agent client
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
virtual wire mode
Digital certificates are issued by organizations known as what term?
certification authorities
Packets that exceed the medium's maximum packet size are known by what term?
giants
Which software below serves as the firewall for Linux systems?
iptables
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
jabber
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
phishing
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
polymorphism
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?
reverse proxy
What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?
user agent server
In ACL statements, the any keyword is equivalent to using what wildcard mask below?
0.0.0.0
What is the minimum acceptable key size for today's security standards?
128 bits
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
160 bit
SNMP agents receive requests from an NMS on what port number?
161
The SSH service listens on what TCP port?
22
The Priority Code Point field in a frame consists of how many bits?
3 bits
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?
5060
How often should administrators and network users be required to change their password?
60 days
What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?
79%
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?
logic bomb
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
man-in-the-middle attack
A highly available server is available what percentage of the time?
99.99%
Which of the following is not a requirement in order to use a softphone?
A wireless carrier to handle the voice path
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?
Access control
What feature of Windows Server allows for agentless authentication?
Active Directory
What software might be installed on a device in order to authenticate it to the network?
Agent
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?
Brute force attack
What kind of firewall blocks traffic based on application data contained within the packets?
Content-filtering firewall
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (distributed reflector DoS) attack
What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
EAP
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
H.323 gateway
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
Port forwarding
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
Posture assessment
You're trying to choose a signaling protocol for your company's network because you're about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?
SIP
What kind of phone is a Skype app?
Softphone
Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
TEMPEST
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?
Traffic policing
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
expedited forwarding
In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?
media gateway controller
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
metasploit
What security principle provides proof of delivery and proof of the sender's identity?
non-repudiation
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?
worms
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPSec
Botnets often make use of what chat protocol in order to receive commands?
IRC
At what layer of the OSI model does the IPSec encryption protocol operate?
Network layer
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
SSTP
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
TKIP
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway