• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Which of the following policies applies to any requests that fall outside the criteria defined in an ACL?

Implicit deny policy

A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is known as:

DMZ (Demilitarized Zone)

Which part of the 192.168.1.5/24 address identifies its network ID?

192.168.1

Which of the following acronyms refers to a solution allowing companies to cut costs related to managing of internal calls?

PBX (Private Branch Exchange)

A solution that allows to make phone calls over a broadband Internet connection instead of typical analog telephone lines is known as:

VoIP (Voice over IP)

Which of the following answers lists a /27 subnet mask?

255.255.255.224

What type of system can be compromised through phreaking?

PBX


(Private Branch Exchange


- a telephone system)

Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?

VLAN (Virtual Local Area Network)

Which security measure is in place when a client is denied access to the network due to outdated antivirus software?

NAC (Network Access Control)

Which of the following terms refers to a technology that allows multiple operating systems to work simultaneously on the same hardware?

Virtualization

A security stance whereby a host is being granted / denied permissions based on its actions after it has been provided with the access to the network is known as:

Post-admission NAC


(Network Access Control)

Which of the following solutions is used to hide the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

NAT (Network Address Translation)

VLAN membership can be set through:

Trunk port / MAC address

In which of the cloud computing infrastructure types clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment?

IaaS (Infrastructure as a Service)

Which of the following cloud service types would provide the best solution for a web developer intending to create a web app?

PaaS (Platform as a Service)

A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is called:

Saas (Software as a Service)

The biggest advantage of public cloud is that all services provided through this type of cloud computing service model are offered free of charge.

False

A concept of effective security posture employing multiple tools and different techniques to slow down an attacker is known as:(Select 2 answers)

Layered security / Defense in depth

Which of the IPsec modes provides entire packet encryption?

Tunnel

Which of the following protocols is used in network management systems for monitoring network-attached devices?

SNMP


(Simple Network Management Protocol)

Which of the following protocols transmit data in an unencrypted form? (Select three answers)

FTP / Telnet / SNMPv1

A group that consists of SNMP devices and one or more SNMP managers is known as:

SNMP community

Which of the following protocols was designed as a secure replacement for Telnet?

SSH (Secure Shell)

A system used to convert a computer's host name into an IP address on the Internet is known as:

DNS (Domain Name System)

DNS database AAAA record identifies:

IPv6 address