• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

Which of the following can be defined as an Internet protocol by which a client workstation can dynamically access a mailbox on a server host to manipulate and retrieve mail messages that the server has received and is holding for the client?

IMAP4

Which of the following statements pertaining to Asynchronous Transfer Mode (ATM) is false?

It carries various sizes of packets

Which conceptual approach to intrusion detection system is the most common?

Knowledge-based intrusion detection

Why is Network File System (NFS) used?

It enables two different types of file systems to interoperate.

What refers to legitimate users accessing networked services that would normally be restricted to them?


Logon abuse

The older coaxial cable has been widely replaced with twisted pair, which is extremely easy to work with, inexpensive, and also resistant to multiple hosts failure at once, especially when used in one of the following topology:

Star Configuration.

Layer 7 Applications Layer Provides specific services for applications such as: (5)

FTP (File Transfer Protocol)
TFTP (Trivial File Transfer Protocol)Used by some X-Terminal systems
HTTP (Hypertext Transfer Protocol)
SNMP (Simple Network Management Protocol)
SMTP (Simple Mail Transfer Protocol)Used by many email applications.

Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host?

Anomaly Detection.

Which of the following statements pertaining to packet filtering is incorrect?

It keeps track of the state of a connection.

The basic language of modems and dial-up remote access systems is:

Asynchronous Communication.

The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers 6 is which of the following?

Presentation Layer

Which of the following mechanisms was created to overcome the problem of collisions that occur on wired networks when traffic is simultaneously transmitted from different nodes?

Carrier sense multiple access with collision detection (CSMA/CD)

What is also known as 10Base5?

Thicknet

Domain Name Service is a distributed database system that is used to map:

Domain Name to IP addresses.

The Domain Name System (DNS) is a global network of:

servers that provide these Domain Name Services.

Which of the following rules appearing in an Internet firewall policy is inappropriate?

Firewalls shall be configured to passively allow all outbound and inbound services.

What is an IP routing table?

A list of station and network addresses with corresponding gateway IP address.

What would you call the process that takes advantages of the security provided by a transmission protocol by carrying one protocol over another?

Tunneling

What is the BEST answer pertaining to the difference between the Session and Transport layers of the OSI model?

The Transport layer sets up communication between computer systems, while the Session layer sets up connections between applications.

Which of the following protocols offers native encryption?

IPSEC, SSH, SSL, TLS