• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Which of the following protocols is a transfer protocol using SSH?



A. SFTP


B. TFTP


C. SICMP


D. CCMP

A. SFTP - Secure FTP transfers files using SSH over port 22.

Of the following, which one provides the most security for FTP?



A. FTP active mode


B. FTPS


C. TFTP


D. SCP

B. FTPS - FTP Secure uses SSL to secure FTP transmissions. FTP can work in both active and passive mode, but this only affects how the ports are used.


Of the following, which is a benefit of IPsec?



A. MAC filtering


B. Flood guard


C. Load balancing


D. Payload encryption

D. Payload encryption - IPsec includes Encapsulating Security Payloades (ESP), which can encrypt the IP packet payload.

What protocol is used to monitor and configure network devices?



A. ICMP


B. SFTP


C. SNMP


D. DNS

C. SNMP - monitors and manages network devices such as routers and switches and uses devices called traps.

Which of the following is an IPv6 address?



A. 192.168.1.100


B. 195.168.1.100/128


C. FE80:20D4:3FF7:003F:DE62


D. FE80:0000:0000:0000:20D4:3FF7:003F:DE62

D. IPv6 uses 128-bit IP addressing and includes eight groups of four hex characters.

Which of the following IP addresses are on the same subnet? (Choose all that apply)



A. 192.168.1.50 - 255.255.255.192


B. 192.168.1.100 - 255.255.255.192


C. 192.168.1.165 - 255.255.255.192


D. 192.168.1.189 - 255.255.255.192

C & D.

An admin decides to block Telnet access to an internal network from any remote device on the Internet. Which of the following is the best choice to accomplish this?



A. Block port 22 at the host firewall


B. Block port 22 on internal routers


C. Block port 23 at the network firewall


D. Block port 23 on internal routers

C. Block 23 at the network firewall

What port does SFTP use?



A. 22


B. 23


C. 443


D. 1443

A. 22

What port do HTTP and HTTPS use?



A. 20 and 21


B. 22 and 25


C. 80 and 443


D. 80 and 1433

C. 80 and 443. Microsoft's SQL server uses port 1433

What port does SMTP use?



A. 22


B. 25


C. 110


D. 143

B. 25. IMAP4 uses port 143

Of the following, what ports are use by NetBIOS (Choose two)



A. 80


B. 137


C. 139


D. 3389

B & C. NetBIOS uses 137, 138 and 139.

Your org. uses switches for connectivity. Of the following, what will protect the switch?



A. Disable unused MAC addresses


B. Disable unused ports


C. Disable unused IPv4 addresses


D. Disable unused IPv6 addresses

B. Disable unused ports

A user plugged a cable into two RJ-45 wall jacks connected to unused ports on a switch. In a short period, this disrupted the overall network performance. What should you do to protect against this problem in the future?



A. Enable loop protection on the switch


B. Disable port security


C. Use a VLAN


D. Create a DMZ

A. Enable loop protection on the switch, such as spanning tree protocol (STP).

What can you use to logically separtate computers in two different departments within a company.



A. A hub


B. A VLAN


C. NAT


D. A flood guard

B. A VLAN, can group several different computers into a virtual network, or logically separate the computers in two different departments.

Most firewalls have a default rule placed at the end of teh firewall's ACL. Wich of the following the most likely default rule?



A. Deny any any


B. Deny ICMP all


C. Allow all all


D. Allow TCP all

A. Deny any any or drop all

Of the following, what best describes a method of managing the flow of network traffic by allowing or denying traffic based on ports, protocols, and addresses?



A. Implicit deny


B. Firewall rules


C. Proxy server content filter


D. Firewall logs

B. Firewall rules are used to define which traffic is allowed and which is denied.

Of the following, what represents the best choice to prevent intrusions on an individual computer?



A. HIDS
B. NIDS


C. Host-based firewall


D. Network-based firewall

C. Host-based firewall - help to prevent intrusions on servers and computers.

Your network includes a subnet that hosts accounting servers with sensitive data. You want to ensure that users in the Marketing Department (on separate subnet) cannot access these servers. Of the following, what would be the easiest to achieve the goal?



A. Enable load balancing


B. Enable port security


C. Use an ACL


D. Add a host-based firewall to each server

C. Use an ACL - on a router can block access to the subnet from another subnet.

Of the following, what controls traffic between networks?



A. A firewall


B. Load balancer


C. VPN concentrator


D. Protocol Analyzer

A. A firewall - controls traffic between networks using rules within an ACL.

An org has a web security gateway installed. What function is this performing?



A. MAC filtering


B. Caching content


C. Hiding internal IP addresses


D. Content filtering

D. Content filtering - web security gateway performs content filtering (including filtering for malicious content)

Your org hosts a large website served by multiple servers. They need to optimize the workload and distribute it equally among all the servers. What should they use?



A. Proxy server


B. Load balancer


C. Web security gateway


D. Security appliance

B. Load balancer - can optimize and distribute data loads across multiple computers or multiple networks.

Of the following choices, what can be used to allow access to specific services from the Internet while protecting access to an internal network?



A. SSH


B. Implicit deny


C. DMZ


D. Port security

C. DMZ - can provide access to services (hosted on servers) from the Internet while providing a layer of protection fro the internal network.

Of the following, what hides the IP addresses of computers inside a network from computers outside the network?



A. Web security gateway


B. Replacing all hubs with switches


C. WAF


D. NAT

D. NAT - translates public IPs to private and private back to public, and hides addresses on the internal network.

Of the following, what is the best choice for a device to filter and cache content from web pages?



A. Web security gateway


B. VPN concentrator


C. Proxy server


D. MAC filtering

C. Proxy server - includes the ability to filter and cache content from web pages.