Network + Chapter 7,8,9

Ace your homework & exams now with Quizwiz!

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

DirectAccess

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?​

IaaS​

A computer that provides support for multiple H.323 terminals and manages communication between them is known as what term below?

MCU

What protocol enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols?​

MPLS

Which QoS technique operates at the OSI layer "2.5"?

MPLS

Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

Natas

At what layer of the OSI model do firewalls operate?

Network

What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls?​

PCI DSS

Which remote access protocol is used over an Ethernet network?

PPPoE

On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?

SS7

RTP and RTCP operate at which layer of the OSI model?

Application layer

What kind of virus runs in place of the computer's normal system files?

Boot sector viruses

What kind of vulnerability is exploited by a ping of death?

Buffer overflow

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Citrix Xen

What of the following features does not distinguish an NGFW from traditional firewalls?

UTM (Unified Threat Management)

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?​

FCS

In H.323, which protocol below handles call or videoconference signaling?​

H.225

What federal organization sets strict standards to protect the privacy of patient records?

HIPAA

When using public and private keys to connect to an SSH server, where must your public key be placed?​

In the authorized keys file on the host where the SSH server is

What wireless attack might a potential hacker execute with a specially configured transmitter?

Jamming

Which tunneling protocol is accepted and used by multiple vendors?

L2TP

At what layer of the OSI model do proxy servers operate?

Layer 7

What authentication protocol sends authentication information in cleartext without encryption?

PAP

Which cloud computing service model gives software developers access to multiple operating systems for testing?

PaaS

What port do SNMP agents listen on?

Port 161

In public key encryption, which key is used to decrypt the message?

Private key

​What option below is not an encryption algorithm method that is used by SSH?

SHA-2

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?

SIEM system​

A reflective attack can be increased in intensity by combining it with what type of attack?

amplification attack

An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​

banner-grabbing attack

What feature on some network switches can be used to detect faked arp messages?

dynamic ARP inspection

A SecurID key chain fob from RSA security generates a password that changes how often?

every 60 seconds

​If multiple honeypots are connected to form a larger network, what term is used to describe the network?

honeynet

The combination of a public key and a private key are known by what term below?

key pair

​Packets that are smaller than a medium's minimum packet size are known by what term below?

runts

What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?

smurf attack

What command retrieves the next record in an SNMP log?

snmpgetnext

What utility in Linux provides standards for generating, storing, and processing messages about events on a system?

syslog

In a VoIP call, what method of transmission is used between two IP phones?

unicast

When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?

user agent client

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?

virtual wire mode

Digital certificates are issued by organizations known as what term?​

​certification authorities

Packets that exceed the medium's maximum packet size are known by what term?​

​giants

Which software below serves as the firewall for Linux systems?​

​iptables

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?​

​jabber

The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?

​phishing

What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?

​polymorphism

A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​

​reverse proxy

What component of SIP is a server that responds to user agent clients' requests for session initiation and termination?

​user agent server

In ACL statements, the any keyword is equivalent to using what wildcard mask below?

0.0.0.0​

What is the minimum acceptable key size for today's security standards?

128 bits

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?​

160 bit

SNMP agents receive requests from an NMS on what port number?​

161

The SSH service listens on what TCP port?

22

The Priority Code Point field in a frame consists of how many bits?​

3 bits

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?

5060

How often should administrators and network users be required to change their password?

60 days

What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?​

79%

What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​

logic bomb​

​An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

man-in-the-middle attack

A highly available server is available what percentage of the time?​

99.99%

Which of the following is not a requirement in order to use a softphone?​

A wireless carrier to handle the voice path

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

Access control

What feature of Windows Server allows for agentless authentication?

Active Directory

What software might be installed on a device in order to authenticate it to the network?

Agent

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?

Brute force attack

What kind of firewall blocks traffic based on application data contained within the packets?

Content-filtering firewall

Which type of DoS attack orchestrates an attack using uninfected computers?

DRDoS (distributed reflector DoS) attack

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

EAP

Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?

H.323 gateway

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

Port forwarding

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

Posture assessment

You're trying to choose a signaling protocol for your company's network because you're about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?

SIP

What kind of phone is a Skype app?

Softphone

​Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

TEMPEST

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?

Traffic policing

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

expedited forwarding

In order for gateways to exchange and translate signaling and control information with each other so that voice and video packets are properly routed through a network, what intermediate device is needed?​

media gateway controller

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​

metasploit

What security principle provides proof of delivery and proof of the sender's identity?​

non-repudiation

Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​

worms

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

​IPSec

Botnets often make use of what chat protocol in order to receive commands?

​IRC

At what layer of the OSI model does the IPSec encryption protocol operate?​

​Network layer

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

​SSTP

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

​SaaS

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?​

​TKIP

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​

​VPN gateway


Related study sets

Finance ch.8 Financial system, intermediation, and financial institutions

View Set

COMPUTER & TECHNOLOGY BASICS COURSE

View Set

FL Health and Life Insurance Exam

View Set

Chapter 22 Introduction to the Cardiovascular System

View Set

when to reject or fail to reject null hypothesis

View Set