• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

Which of the following refers to the end user’s desktop devices such as a desktop computer, laptop, VoIP telephone, or other endpoint device?

Workstation Domain

Which of the following refers to the entity responsible for global coordination of IP addressing, DNS root, and other Internet protocol resources?

Internet Assigned Numbers Authority (IANA)

Which of the following is not a characteristic of a private address?

They are leased to users and businesses

Which term describes a form of security based on hiding details of a system, or creating convolutions that are difficult to understand?

Security through obscurity
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a set of characters or hex values)?

Brute-force attack

Which attack uses a pre-constructed list of potential passwords or encryption keys?

Dictionary password attack

Which protocol and a data exchange system commonly used over TCP/IP networks, including the Internet, but which is unencrypted and performs authentication and data transfer in plaintext?

File Transfer Protocol (FTP)

Which of the following refers to the process of simulating and testing a new concept, design, programming technique, and so on before deployment into a production environment?

Modeling

Which of the following refers to the hardware, operating system software, database software, client-server applications, and data that are typically housed in the organization’s data center and/or computer rooms?

System/Application Domain

Which of the following is given to an Application Layer protocol used by e-mail clients to receive messages from an e-mail server?

Post Office Protocol (POP)

Which term describes portions of a software system that unauthenticated users can run?

Attack surface

Which of the following is defined as the act of avoiding single points of failure by building in multiple elements, pathways, or methods of accomplishing each mission-critical task?

Redundancy

Which of the following is not true of VLANs?

They require a change of IP address or re-cabling.

The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects of an IT infrastructure for aberrant or abnormal events of any type.

True

The WAN Domain refers to the hardware, operating system software, database software, client-server applications, and data that are typically housed in the organization’s data center and/or computer rooms.

False

SMTP is an Application Layer protocol used by e-mail clients to send messages to an e-mail server and is also used to relay messages between e-mail servers.

True

Telnet is a protocol and a service used to remotely control or administer a host through a plaintext command-line interface.

True

Multifactor authentication is significantly less secure than any single factor form of authentication.

False

The principle of least privilege states that you should grant users the fewest capabilities, permissions, and privileges possible to complete their assigned work, without additional capabilities.

True

Node security focuses on the tasks for each type of networking device to improve its security; it takes the generic recommendations of system hardening and expands them with additional node/host specific improvements.

True

sdf

sdf

sdf

sdf