• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
13.01
To reduce the possibility of security break-ins from unauthorized users, which should be
implemented?
A. Packet sniffers
B. Firewall
C. Port scanners
D. Intrusion detection system


To reduce the possibility of security break-ins from unauthorized users, which should be
implemented?
A. Packet sniffers
B. Firewall
C. Port scanners
D. Intrusion detection system



13.02
What is the main difference between a private network and a public network?
A. In a private network, everyone has access. In a public network, only authorized users
have access.
B. In a private network, only authorized users have access. In a public network, only
authorized users have access.
C. In a private network, only authorized users have access. In a public network, everyone
that is connected has access.
D. In a private network, everyone has access. In a public network, only the first 100 people
have access.

What is the main difference between a private network and a public network?
A. In a private network, everyone has access. In a public network, only authorized users
have access.
B. In a private network, only authorized users have access. In a public network, only
authorized users have access.
C. In a private network, only authorized users have access. In a public network, everyone
that is connected has access.

D. In a private network, everyone has access. In a public network, only the first 100 people
have access.



13.03
You have a remote user that can connect to the Internet but not to the office via their
VPN client. After determining the problem, which should be your next step?
A. Have the client reboot their host
B. Make sure the user has the correct VPN address and password
C. Have the client reinstall their VPN software
D. Reboot the router at the corporate office


You have a remote user that can connect to the Internet but not to the office via their
VPN client. After determining the problem, which should be your next step?
A. Have the client reboot their host
B. Make sure the user has the correct VPN address and password
C. Have the client reinstall their VPN software
D. Reboot the router at the corporate office



13.04
Which IP Address should you deny into your internetwork?
A. 126.10.10.0/8
B. 168.0.0.0/8
C. 128.0.0.0/8
D. 127.0.0.0/8


Which IP Address should you deny into your internetwork?
A. 126.10.10.0/8
B. 168.0.0.0/8
C. 128.0.0.0/8
D. 127.0.0.0/8 (This is an address from the restriced loopback
local host range.)



13.05
Which of the following is a tunneling protocol?
A. Layer 2 Tunneling Protocol (L2TP)
B. Internet Protocol Security (IPSec)
C. Secure Sockets Layer (SSL)
D. All of the above


Which of the following is a tunneling protocol?
A. Layer 2 Tunneling Protocol (L2TP)
B. Internet Protocol Security (IPSec)
C. Secure Sockets Layer (SSL)
D. All of the above



13.06
Which tunneling protocol is based on RSA public-key encryption?
A. SSL
B. L2TP
C. IPSec
D. SSL VPN


Which tunneling protocol is based on RSA public-key encryption?
A. SSL
B. L2TP
C. IPSec
D. SSL VPN



13.07
What is the minimum number of characters you should use when creating a secure password?
A. 6
B. 7
C. 8
D. 15


What is the minimum number of characters you should use when creating a secure password?
A. 6
B. 7
C. 8
D. 15



13.08
Which layer of the OSI model does IPSec operate in?
A. Physical
B. Network
C. Transport
D. Application


Which layer of the OSI model does IPSec operate in?
A. Physical
B. Network
C. Transport
D. Application



13.09
Which protocol works in both the transport mode and tunneling mode?
A. SSL
B. L2TP
C. PPTP
D. IPSec


Which protocol works in both the transport mode and tunneling mode?
A. SSL
B. L2TP
C. PPTP
D. IPSec



13.10
Companies that want to ensure their data is secure during transit should follow what
practice?
A. Firewalls
B. Encryption
C. Data accounting
D. Routing table


Companies that want to ensure their data is secure during transit should follow what
practice?
A. Firewalls
B. Encryption
C. Data accounting
D. Routing table



13.11
Which network utilities do not have the ability to encrypt passwords? (Select two.)
A. FTP
B. SSH
C. Telnet
D. SCP


Which network utilities do not have the ability to encrypt passwords? (Select two.)
A. FTP
B. SSH
C. Telnet
D. SCP



13.12
To encode or read an encrypted message, what tool is necessary?
A. Routing table
B. Internet access
C. Encryption key
D. Email address


To encode or read an encrypted message, what tool is necessary?
A. Routing table
B. Internet access
C. Encryption key
D. Email address



13.13
Which keys are known as symmetrical keys?
A. Private
B. Public
C. Diffie-Hellman
D. RSA


Which keys are known as symmetrical keys?
A. Private
B. Public
C. Diffie-Hellman
D. RSA



13.14
Which of the following is not a type of public-key encryption?
A. Diffie-Hellman algorithm
B. RSA Data Security
C. Pretty Good Privacy (PGP)
D. DES


Which of the following is not a type of public-key encryption?
A. Diffie-Hellman algorithm
B. RSA Data Security
C. Pretty Good Privacy (PGP)
D. DES



13.15
Which of the following VPN protocols runs over port 1723 and allows encryption to be
done at the data level, and allows secure access?
A. RAS
B. Radius
C. PPPoE
D. PPTP


Which of the following VPN protocols runs over port 1723 and allows encryption to be
done at the data level, and allows secure access?
A. RAS
B. Radius
C. PPPoE
D. PPTP



13.16
At which stage of PPPoE are the MAC addresses of each of the end points of the connection
given to each other so that a PPP connection can be made?
A. Session
B. Discovery
C. Transport
D. Final


At which stage of PPPoE are the MAC addresses of each of the end points of the connection
given to each other so that a PPP connection can be made?
A. Session
B. Discovery (FYI -- The second stage is the Session stage)
C. Transport
D. Final



13.17
A network administrator wanting to assign passwords to individual files, folders, or printers
would implement which type of security?
A. Building password
B. Group password
C. Share-level security
D. User-level security


A network administrator wanting to assign passwords to individual files, folders, or printers
would implement which type of security?
A. Building password
B. Group password
C. Share-level security
D. User-level security



13.18
Which of the following authentication methods allows for domain level authentication on
both wired and wireless networks?
A. RADIUS
B. TACACS+
C. PKI
D. RDP


Which of the following authentication methods allows for domain level authentication on
both wired and wireless networks?
A. RADIUS (RADIUS is capable of delivering both authentication and encryption in either wired or wireless networks.)
B. TACACS+
C. PKI
D. RDP



13.19
Which user-client-server authentication software system combines user authentication and
authorization into one central database and maintains user profiles?
A. RADIUS
B. TACACS+
C. Kerberos
D. PKI


Which user-client-server authentication software system combines user authentication and
authorization into one central database and maintains user profiles?
A. RADIUS
B. TACACS+
C. Kerberos
D. PKI



13.20
Which of the following is not a Network Access Control method?
A. CHAP
B. 802.1x
C. EAP
D. ICA


Which of the following is not a Network Access Control method?
A. CHAP
B. 802.1x
C. EAP
D. ICA (ICA -- Independent Computing Architecture -- is a protocol to enable remote desktops. It does not control access.)



13.21
What two types of addresses can access control lists filter?

IP addresses and MAC addresses


13.22
Which encryption protocol works with both IPv4 and IPv6?

IPSec


13.23
Which encryption protocol or standard allows you to create a virtual subnet on an intranet?

SSL VPN


13.24
Which user-authentication method uses a public key and private key pair?

PKI


13.25
In an authentication system that uses private and public keys, who should have access to the
private key?

Only the owner of the key


13.26
Which authentication method relies on tickets to grant access to resources?

Kerberos


13.27
In computer security, what does AAA stand for?

Authentication, authorization, and accounting


13.28
Which network-access security method is commonly used in wireless networks?

802.1x


13.29
Which user-authentication method is available only in an all-Windows environment?

MS-CHAP


13.30
Which user-authentication method utilizes the TCP protocol?

TACACS+