• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back

A device designed to forward data packets between networks is called:

Router

The last default rule on a firewall:

Deny all traffic.

An access control model in which access to resources is granted or denied depending on Access Control List (ACL) entries is also known as:

Rule Based Access Control

A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is known as:

DMZ

Which part of the 192.168.1.5/24 address identifies its network ID?

192.168.1

Which of the following acronyms refers to a solution allowing companies to cut costs related to the managing of internal calls?

PBX

Which of the following answers lists a /27 subnet mask?

255.255.255.224

What type of system can be compromised through phreaking?

PBX

Which of the following terms refers to a logical grouping of computers that allow computer hosts to act as if they were attached to the same broadcast domain, regardless of their physical location?

VLAN

VLAN membership can be set through:

physical address, trunk port, MAC address

A concept of effective security posture employing multiple tools and different techniques to slow down an attacker is known as:

'layered security' & 'defense in depth'

A group that consists of SNMP devices and one or more SNMP managers is known as:

SNMP community

A system used to convert a computer's host name into an IP address on the Internet is known as:

DNS

A networking standard for linking data storage devices over an IP network is known as:

iSCSI

Which of the protocols listed below facilitate(s) communication between SAN devices?

iSCSI & FCoE

FTP runs on ports

20 & 21

Which of the following ports enable(s) retrieving email messages from a remote server?

110 & 143

netBios ports

137, 138, 139

IMAP runs on port

143

In the OSI model, TCP resides at the:

transport layer

Which of the answers listed below refers to an authentication framework frequently used in wireless networks and point-to-point connections?

EAP

A United States federal government initiative aimed at enabling agencies to continue their essential functions across a broad spectrum of emergencies is known as:

COOP

Which of the following answers list(s) example(s) of physical security control types? (Select all that apply)

Biometrics, Motion Detection, Video Surveillance

Which of the following examples falls into the category of deterrent security control types?

Lighting, Alarms

What is the goal of tabletop exercises? (Select all that apply)

Disaster recovery planning, Discussing a simulated emergency situation

Hardware-based RAID Level 1: (Select 3 answers)

Requires at least 2 drives to implement,




Offers improved reliability by creating identical data sets on each drive (failure of one drive does not destroy the array as each drive contains identical copy of the data),




is called disk mirroring

Hardware-based RAID Level 5: (Select 2 answers)

Requires at least 3 drives to implement




Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created from the remaining drives)

Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of hard drive failure? (Select best answer)

drive imaging

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup.

false

Restoring data from an incremental backup requires: (Select 2 answers)

All copies of incremental backups made since the last full backup ( Your answer)




copy of last full backup

purpose of windows defender

Protection against spyware and other potentially unwanted software ( Missed)

URL hijacking also known as

typo squatting

exploit to take advantage of spoofed MAC address

ARP poisoning

Pharming refers to what attack

DNS poisoning

Xmas attack refers to

port scan and DOS

smurf attack

DDOS, IP spoofing, large number of ICMP replies

Which of the following solutions simplifies configuration of new wireless networks by providing non-technical users with a capability to easily configure network security settings and add new devices to an existing network?

WPA

Which of the answers listed below refers to a Wi-Fi Protected Setup (WPS) exploit?

PIN recovery

A temporary area of memory allocated with a fixed size for holding data while it's waiting to be transferred to another location is known as:

buffer

Flash cookies

LSO

AES-based encryption mode implemented in WPA2 is known as:

CCMP

Which of the following protocols was introduced to strengthen existing WEP implementations without requiring the replacement of legacy hardware?

TKIP

Which of the following functionalities allows a DLP system to fulfil its role?

Content Inspection

Which of the answers listed below refers to an agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection?

ISA (interconnection security agreement)

A document established between two or more parties to define their respective responsibilities in accomplishing a particular goal or mission is known as:

MOU (memorandum of understanding)

Which of the following answers refers to a key document governing the relationship between two business organisations?

BPA (business partners agreement)

An agreement between a service provider and the user(s) defining the nature, availability, quality, and scope of the service to be provided is known as:

SLA (service level agreement)