Capston Test 3

Ace your homework & exams now with Quizwiz!

A best practice for compliance in the WAN Domain is to establish a single wide area network (WAN) connection to avoid conflicts with multiple connections.

False

A demilitarized zone (DMZ) defines the rules a connecting node must meet to establish a secure connection with your network.

False

An intrusion detection system (IDS) is a server deliberately set up as insecure in an effort to trap or track attackers.

False

What is meant by network access control (NAC)?

It defines the rules a connecting node must meet to establish a secure connection with your network.

The hardware devices that connect other devices and computers using connection media are known as?

Networking Devices

At which layer of the OSI reference model do most wide area network (WAN) protocols operate?

OSI Layer 2

The hardware that provides one or more services to users, such as server computers, printers, and network storage devices, are known as?

Server computers and services devices

Penetration tests are ________.

Simulations of attacks

Unshielded twisted pair (UTP) is not susceptible to interference.

False

In an access control system in which a user is being identified, authenticated, and authorized, what is the subject?

User

Which of the following is NOT a common method of maximizing C-I-A in the LAN-to-WAN Domain?

Configure a single ISP Connection

Which of the following is NOT typically a LAN Domain component?

Connection Media, Networking Devices, Server computers & service devices, networking services software are LAN domain components.

Of the following, what is the best method of maximizing confidentiality in the Workstation Domain?

Encryption

What is the primary type of control used to protect data in the WAN Domain?

Encryption

Which of the following is NOT a form of authentication?

Encryption

A best practice for compliance in the WAN Domain is to implement load balancing on multiple wide area network (WAN) connections.

True

A physical server on a LAN requires a hard disk, a network interface, and software to provide network access to files and folders on the attached disks.

True

A security control in the LAN Domain is anti-malware software.

True

C-I-A is the confidentiality, integrity, and availability properties that describe a secure object

True

Encryption takes cleartext data and turns it into ciphertext through the use of an algorithm and a key.

True

In the LAN Domain, _________________ provides the interface between the hardware and the Application Layer software

network operating system (NOS)

A service level agreement (SLA) signifies that a service organization has had its control objectives and control activities examined by an independent auditing firm.

False

Comparing 802.11ac, 802.11g, and 802.11n, 802.11g offers the fastest maximum speed.

False

Multiprotocol Label Switching (MPLS) is a local area network protocol.

False

Shielded twisted pair (STP) cabling is immune to radio and electrical interference and transfers data at extremely high speeds.

False

The overall purpose of authentication requirements is to enforce the basic pillars or tenets of security.

False

The purpose of a demilitarized zone (DMZ) is to maintain two connections to an Internet service provider (ISP) for redundancy.

False

The term virtual private network (VPN) describes an environment in which the components that make up an application reside on different computers.

False

IEEE 802.11 describes a standard for wireless LAN (WLAN) communication protocols

True

Multifactor authentication increases the strength of any form of authentication.

True

Network access control (NAC) enables you to check a client computer for compliance with security policies and either grant or deny its access to the internal network.

True

One method of maximizing availability in the LAN Domain is to create secondary copies, or backups, of data in case the primary copy is damaged or deleted.

True

Secure virtual private networks (VPNs) are VPNs in which all traffic is encrypted.

True

Service Organization Control (SOC) report 1 is based on "Statement on Standards for Attestation Engagements (SSAE) No. 16," formerly known as SAS 70.

True

Shielded twisted pair (STP) cabling is similar to unshielded twisted pair (UTP) but with foil shielding around each pair.

True

The Telecommunication Standardization Sector (ITU-T) is an organization that produces global telecommunications standards.

True


Related study sets

Advertising and Promotion Management

View Set

sq23, sq22, sq21, sq24, sq19, sq18, sq17, sq16, SQ15, sq14, sq13, SQ12, SQ11, sq09 & sq10, sq08, SQ07, SQ06, SQ05, POLI 102

View Set

AP Government Chapter 2 Assignment

View Set

Chapter 1 introduction to nursing

View Set

Ch 24- liability, defenses, and discharge

View Set