Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
- 3rd side (hint)
13.01
To reduce the possibility of security break-ins from unauthorized users, which should be implemented? A. Packet sniffers B. Firewall C. Port scanners D. Intrusion detection system |
To reduce the possibility of security break-ins from unauthorized users, which should be implemented? A. Packet sniffers B. Firewall C. Port scanners D. Intrusion detection system |
|
|
13.02 What is the main difference between a private network and a public network? A. In a private network, everyone has access. In a public network, only authorized users have access. B. In a private network, only authorized users have access. In a public network, only authorized users have access. C. In a private network, only authorized users have access. In a public network, everyone that is connected has access. D. In a private network, everyone has access. In a public network, only the first 100 people have access. |
What is the main difference between a private network and a public network? A. In a private network, everyone has access. In a public network, only authorized users have access. B. In a private network, only authorized users have access. In a public network, only authorized users have access. C. In a private network, only authorized users have access. In a public network, everyone that is connected has access. D. In a private network, everyone has access. In a public network, only the first 100 people have access. |
|
|
13.03 You have a remote user that can connect to the Internet but not to the office via their VPN client. After determining the problem, which should be your next step? A. Have the client reboot their host B. Make sure the user has the correct VPN address and password C. Have the client reinstall their VPN software D. Reboot the router at the corporate office |
You have a remote user that can connect to the Internet but not to the office via their VPN client. After determining the problem, which should be your next step? A. Have the client reboot their host B. Make sure the user has the correct VPN address and password C. Have the client reinstall their VPN software D. Reboot the router at the corporate office |
|
|
13.04 Which IP Address should you deny into your internetwork? A. 126.10.10.0/8 B. 168.0.0.0/8 C. 128.0.0.0/8 D. 127.0.0.0/8 |
Which IP Address should you deny into your internetwork? A. 126.10.10.0/8 B. 168.0.0.0/8 C. 128.0.0.0/8 D. 127.0.0.0/8 (This is an address from the restriced loopback |
local host range.)
|
|
13.05 Which of the following is a tunneling protocol? A. Layer 2 Tunneling Protocol (L2TP) B. Internet Protocol Security (IPSec) C. Secure Sockets Layer (SSL) D. All of the above |
Which of the following is a tunneling protocol? A. Layer 2 Tunneling Protocol (L2TP) B. Internet Protocol Security (IPSec) C. Secure Sockets Layer (SSL) D. All of the above |
|
|
13.06 Which tunneling protocol is based on RSA public-key encryption? A. SSL B. L2TP C. IPSec D. SSL VPN |
Which tunneling protocol is based on RSA public-key encryption? A. SSL B. L2TP C. IPSec D. SSL VPN |
|
|
13.07 What is the minimum number of characters you should use when creating a secure password? A. 6 B. 7 C. 8 D. 15 |
What is the minimum number of characters you should use when creating a secure password? A. 6 B. 7 C. 8 D. 15 |
|
|
13.08 Which layer of the OSI model does IPSec operate in? A. Physical B. Network C. Transport D. Application |
Which layer of the OSI model does IPSec operate in? A. Physical B. Network C. Transport D. Application |
|
|
13.09 Which protocol works in both the transport mode and tunneling mode? A. SSL B. L2TP C. PPTP D. IPSec |
Which protocol works in both the transport mode and tunneling mode? A. SSL B. L2TP C. PPTP D. IPSec |
|
|
13.10 Companies that want to ensure their data is secure during transit should follow what practice? A. Firewalls B. Encryption C. Data accounting D. Routing table |
Companies that want to ensure their data is secure during transit should follow what practice? A. Firewalls B. Encryption C. Data accounting D. Routing table |
|
|
13.11 Which network utilities do not have the ability to encrypt passwords? (Select two.) A. FTP B. SSH C. Telnet D. SCP |
Which network utilities do not have the ability to encrypt passwords? (Select two.) A. FTP B. SSH C. Telnet D. SCP |
|
|
13.12 To encode or read an encrypted message, what tool is necessary? A. Routing table B. Internet access C. Encryption key D. Email address |
To encode or read an encrypted message, what tool is necessary? A. Routing table B. Internet access C. Encryption key D. Email address |
|
|
13.13 Which keys are known as symmetrical keys? A. Private B. Public C. Diffie-Hellman D. RSA |
Which keys are known as symmetrical keys? A. Private B. Public C. Diffie-Hellman D. RSA |
|
|
13.14 Which of the following is not a type of public-key encryption? A. Diffie-Hellman algorithm B. RSA Data Security C. Pretty Good Privacy (PGP) D. DES |
Which of the following is not a type of public-key encryption? A. Diffie-Hellman algorithm B. RSA Data Security C. Pretty Good Privacy (PGP) D. DES |
|
|
13.15 Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the data level, and allows secure access? A. RAS B. Radius C. PPPoE D. PPTP |
Which of the following VPN protocols runs over port 1723 and allows encryption to be done at the data level, and allows secure access? A. RAS B. Radius C. PPPoE D. PPTP |
|
|
13.16 At which stage of PPPoE are the MAC addresses of each of the end points of the connection given to each other so that a PPP connection can be made? A. Session B. Discovery C. Transport D. Final |
At which stage of PPPoE are the MAC addresses of each of the end points of the connection given to each other so that a PPP connection can be made? A. Session B. Discovery (FYI -- The second stage is the Session stage) C. Transport D. Final |
|
|
13.17 A network administrator wanting to assign passwords to individual files, folders, or printers would implement which type of security? A. Building password B. Group password C. Share-level security D. User-level security |
A network administrator wanting to assign passwords to individual files, folders, or printers would implement which type of security? A. Building password B. Group password C. Share-level security D. User-level security |
|
|
13.18 Which of the following authentication methods allows for domain level authentication on both wired and wireless networks? A. RADIUS B. TACACS+ C. PKI D. RDP |
Which of the following authentication methods allows for domain level authentication on both wired and wireless networks? A. RADIUS (RADIUS is capable of delivering both authentication and encryption in either wired or wireless networks.) B. TACACS+ C. PKI D. RDP |
|
|
13.19 Which user-client-server authentication software system combines user authentication and authorization into one central database and maintains user profiles? A. RADIUS B. TACACS+ C. Kerberos D. PKI |
Which user-client-server authentication software system combines user authentication and authorization into one central database and maintains user profiles? A. RADIUS B. TACACS+ C. Kerberos D. PKI |
|
|
13.20 Which of the following is not a Network Access Control method? A. CHAP B. 802.1x C. EAP D. ICA |
Which of the following is not a Network Access Control method? A. CHAP B. 802.1x C. EAP D. ICA (ICA -- Independent Computing Architecture -- is a protocol to enable remote desktops. It does not control access.) |
|
|
13.21 What two types of addresses can access control lists filter? |
IP addresses and MAC addresses |
|
|
13.22 Which encryption protocol works with both IPv4 and IPv6? |
IPSec |
|
|
13.23 Which encryption protocol or standard allows you to create a virtual subnet on an intranet? |
SSL VPN |
|
|
13.24 Which user-authentication method uses a public key and private key pair? |
PKI |
|
|
13.25 In an authentication system that uses private and public keys, who should have access to the private key? |
Only the owner of the key |
|
|
13.26 Which authentication method relies on tickets to grant access to resources? |
Kerberos |
|
|
13.27 In computer security, what does AAA stand for? |
Authentication, authorization, and accounting |
|
|
13.28 Which network-access security method is commonly used in wireless networks? |
802.1x |
|
|
13.29 Which user-authentication method is available only in an all-Windows environment? |
MS-CHAP |
|
|
13.30 Which user-authentication method utilizes the TCP protocol? |
TACACS+ |
|