• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

Pete, a network administrator, is implementing IPv6 in the DMZ. Which of the following protocols must he allow through the firewall to ensure the web servers can be reached via IPv6 from an IPv6 enabled Internet host?

TCP port 80 and TCP port 443

Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?

Stateful Firewall
The Chief Technical Officer (CTO) is worried about an increased amount of malware detected on end user’s workstations. Which of the following technologies should be recommended to detect such anomalies?
Host-based IDS
Which of the following is an important step in the initial stages of deploying a host-based firewall?
Determining the list of exceptions
Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the corporate network. He has tasked the security engineers to implement a technology that is capable of alerting the team when unusual traffic is on the network. Which of the following types of technologies will BEST address this scenario?
Anomaly Based IDS
A security technician wishes to gather and analyze all Web traffic during a particular time period. Which of the following represents the BEST approach to gathering the required data?
Configure a proxy server to log all traffic destined for ports 80 and 443
Several users report to the administrator that they are having issues downloading files from the file server. Which of the following assessment tools can be used to determine if there is an issue with the file server?
The network security engineer just deployed an IDS on the network, but the Chief Technical Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the following types of IDS has been deployed?
Signature Based IDS
Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
Sara, a security technician, has received notice that a vendor coming in for a presentation will require access to a server outside of the network. Currently, users are only able to access remote sites through a VPN connection. How could Sara BEST accommodate the vendor?
Write a firewall rule to allow the vendor to have access to the remote site.
Joe, a network security engineer, has visibility to network traffic through network monitoring tools. However, he’s concerned that a disgruntled employee may be targeting a server containing the company’s financial records. Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?
Which of the following is an example of a false negative?
The IDS does not identify a buffer overflow.
Concurrent use of a firewall, content filtering, antivirus software and an IDS system would be considered components of:
Layered security
An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend against them as well. Which of the following is being described here?

Users report that they are unable to access network printing services. The security technician checks the router access list and sees that web, email, and secure shell are allowed. Which of the following is blocking network printing?

Implicit deny
Which of the following security architecture elements also has sniffer functionality? (Select TWO).

Which of the following devices is MOST likely being used when processing the following?