• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/47

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

47 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

Question:
With WPA 2, the encryption keys that are used for each client are: (Choose all that apply.)

A) totally unique
B) client specific
C) reused only after every 3000 rounds of exchange
D) reused only after every 30000 rounds of exchange

A)* and
B)*Explanation: WPA 2 creates fresh session keys on every association. The encryption keys that are used for each
client are totally unique and client specific.

Question:
What mechanism can be used to filter the MAC addresses of wireless clients that are allowed to connect to the AP?

A) MAC filter
B) MAC table
C) CAM table filter
D) routing table poisoning
E) ARP table poisoning

A)*Explanation: You may use a MAC filter to filter the MAC addresses of wireless clients that are allowed to connect
to the AP. Every wireless adaptor has a MAC address hard coded into it anyway.

Question:
Which of the following is a protection feature built into many firewalls that allows the administrator to tweak the
tolerance for unanswered login attacks?

A) MAC filter
B) Flood guard
C) MAC limiter
D) Security posture

B)*Explanation: A flood guard is a protection feature built into many firewalls that allows the administrator to tweak
the tolerance for unanswered login attacks. Reducing this tolerance makes it possible to lessen the likelihood of a
successful DoS attack.

Question:
Talking about antenna types, a __________ antenna has two identical conductive elements bilaterally symmetrical.

A) Dipole
B) Monopole
C) Omnidirectional
D) Tripole

A)*Explanation: Talking about antenna types, a dipole antenna has two identical conductive elements bilaterally
symmetrical, while a monopole antenna has one conductor with one side of the feedline connected.

Question:
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented
unless strictly necessary.

A) False
True
True only if you have no existing hardware inventory in place.
True only if your firewall is not from a name brand manufacturer.

A)* FalseExplanation: Firewall configuration, administration and operational procedures should be documented.
Configuration of multiple firewalls should be identical. Integrity checking of the configuration files of the firewall
should be performed regularly.

Question:
Which of the following provides services similar to TCP and UDP for WAP?

A) WTLS
B) WDP
C) WTP
D) WFMD

C)*Explanation: The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP.

Question:
Which of the following services use only TCP ports and not UDP?

A) IMAP
B) LDAP
C) FTPS
D) SFTP

D)*Explanation: SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports.

Question:
Which protocol is mainly used to enable access to the Internet from a mobile device or smartphone?

A) WEP
B) WTLS
C) WAP
D) WPO

C)*Explanation: Wireless Application Protocol (WAP) is an open international standard for applications that use
wireless communication.

Question:
Which feature of cloud computing involves dynamically provisioning (or de-provisioning) resources as needed?

A) Multitenancy
B) Elasticity
C) CMDB
D) Sandboxing

B)*Explanation: Elasticity is a feature of cloud computing that involves dynamically provisioning (or deprovisioning)
resources as needed.

Question:
Which of the following is synonymous with MAC filtering?

A) TKIP
B) Network lock
C) EAP-TTLS
D) MAC Secure

B)*Explanation: The term network lock is synonymous with MAC filtering.

Question:
Secure router configuration may be achieved if:

A) All the latest patches are applied.
B) Hardware based routers are deployed.
C) Software based routers are deployed.
D) Routing takes place at layer 4.
E) Routing takes place at layer 7.

A)* Explanation: Routing takes place at layer 3. If it is compromised, then your network will be in great danger. You
should implement the necessary security measures as recommended by the vendor to secure the router. Make sure
all the latest patches are applied.

Question:


Remote access allows your users to dial in from any place that has:

A) a normal phone connection
B) a broadband connection only
C) an ISDN connection only
D) a FDDI connection only

A)*Explanation: Remote access allows your users to dial in from any place that has a normal phone connection. Once
a connection is made, the user can access programs or data on the network, subject to security clearance via the
remote access server.

Question:
Which RAID level writes parity to two different drives, thus providing fault tolerance to the system even in the
event of the failure of two drives in the array?

A) RAID 0+1
B) RAID 6
C) RAID 5
D) RAID 1+0

B)*Explanation: RAID 6 writes parity to two different drives, thus providing fault tolerance to the system even in the
event of the failure of two drives in the array.

Question:
To protect against email spamming in an effective manner, you should install:

A) spam filter software
B) VPN concentrator
C) event viewer
D) packet sniffer
E) None of the choices.

A)*Explanation: To protect against email spamming, you should install spam filter software, and consider removing
all unused mail daemons. Spam filters may work at the server side, or at the client end, depending on the software
you choose.

Question:
Which of the following strategies involves sharing some of the risk burden with someone else, such as an insurance
company?

A) Risk acceptance
B) Risk avoidance
C) Risk deterrence
D) Risk mitigation
E) Risk transference

E)*Explanation: Risk transference involves sharing some of the risk burden with someone else, such as an insurance
company.

Question:
Which of the following are available protocols for security purposes? (Choose all that apply.)

A)* IPSec
B)* TLS
C)* SSL
D)* SSH
E)* NetBIOS

All*Explanation: A protocol is a language that both hosts must follow in order to communicate. The different available
protocols include IPSec, SNMP, SSH, DNS, TLS, SSL, TCP/IP, FTPS, HTTPS, SCP, ICMP, IPv4, IPv6, ISCSI,
Fibre Channel, FCoE, FTP SFTP, TFTP, TELNET, HTTP, and NetBIOS. IPSec is an encryption standard. TLS is
transport layer security. SSL is for HTTPS. SSH is secure shell.

Question:


Which of the following are multiport devices that improve network efficiency?

A) Switches
B) Modems
C) Gateways
D) Concentrators

A)*Explanation: Switches are multiport devices that improve network efficiency. A switch typically has a small
amount of information about systems in a network.

Question:
You may use a flood guard system to defend against:

A) DDOS attacks
B) virus attacks
C) trojan horses
D) root kits
E) shoulder servings

A)*Explanation: Distributed denial of service (DDOS) uses a large number of compromised hosts to flood a target
system with network requests. You may use a flood guard system or software to defend against flooding attempts.

Question:
All site surveys share the goal of:

A) Determining the number and placement of APs for providing adequate coverage.
B) Determining the horizontal position of APs for providing adequate coverage.
C) Determining the vertical position of APs for providing adequate coverage.
D) Determining the polarization of APs for providing adequate coverage.

A)*Explanation: A site survey has the goal of determining the number and placement of APs for providing adequate
coverage. It is a MUST for any wireless network installation and implementation effort.

Question:
Which of the following strategies necessitates an identified risk that those involved understand the potential
cost/damage and agree to live with it?

A) Risk acceptance
B) Risk avoidance
C) Risk deterrence
D) Risk mitigation
E) Risk transference

A)*Explanation: Risk acceptance necessitates an identified risk that those involved understand the potential cost or
damage and agree to accept it.

Question:
Segmentation and traffic isolation at layer 3 generally requires:

A) subnetting
B) supernetting
C) route summarization
D) route reduction

A)* Explanation: With a router, hosts attached to the router ports are not on the same subnet. This is about
segmentation and traffic isolation. Subnetting is required for this configuration to be established.

Question:
Which of the following are available for file transfer? (Choose all that apply.)

A) SFTP
B) TFTP
C) FTP
D) DNS
E) FCoE
F) ISCSI

A)* SFTP
B)* TFTP
C)* FTPExplanation: A protocol is a language - one that both hosts must follow in order to communicate. The different
available protocols include IPSec, SNMP, SSH, DNS, TLS, SSL, TCP/IP, FTPS, HTTPS, SCP, ICMP, IPv4, IPv6,
ISCSI, Fibre Channel, FCoE, FTP SFTP, TFTP, TELNET, HTTP, and NetBIOS. FTP and its variations are for file
transfer over the internet.

Question:


What can be used to offer an extra layer of protection on the network for those hosts running behind the firewall?

A) DMZ
B) Reverse proxy
C) Caching only proxy
D) Load balancer
E) Load concentrator

A)*Explanation: A demilitarized zone (DMZ) is a small IP subnetwork. It sits between the trusted internal LAN and
the public Internet. It is an extra layer of protection for those hosts running behind the firewall.

Question:
Which IDS system uses algorithms to analyze the traffic passing through the network?

A) Arithmetical
B) Alegbraic
C) Statistical
D) Heuristic

D)*Explanation: A heuristic system uses algorithms to analyze the traffic passing through the network.

Question:
Although a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of which of the
following?

A) Public and community
B) Public and private
C) Private and community
D) Two or more communities

B)*Explanation: While a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of
public and private.

Question:
You've been notified that you'll soon be transferred to another site. Before you leave, you're to audit the network
and document everything in use and the reason why it's in use. Thenext administrator will use this documentation
to keep the network running. Which of the following protocols isn't a tunneling protocol but is probably used at
your site by tunnelingprotocols for network security?

A) IPSec
B) PPTP
C) L2TP
D) L2F

A)*Explanation: IPSec provides network security for tunneling protocols. IPSec can be used with many different
protocols besides TCP/IP, and it has two modes of security.

Question:
You're outlining your plans for implementing a wireless network to upper management. Suddenly, a vice president
brings up the question of security. Which protocol was designedto provide security for a wireless network and is
considered equivalent to the security of a wired network?

A) WAP
B) WTLS
C) WPA2
D) IR

C)*Explanation: Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to that on a
wired network, and it implements elements of the 802.11i standard.

Question:
Which of the following can be implemented as a software or hardware solution and is usually associated with a
device-a router, a firewall, NAT, and so on-used to shift a load from one device to another?

A) Proxy
B) Hub
C) Load Balancer
D) Switch

C)*Explanation: A load balancer can be implemented as a software or hardware solution and is usually associated
with a device-a router, a firewall, NAT, and so on. As the name implies, it is used to shift a load from one device to
another.

Question:
Packets between the WAP server and the Internet may be intercepted. What is this vulnerability known as?

A) Packet sniffing
B) Minding the gap
C) Middle man
D) Broken promise

A)*Explanation: When the interconnection between the WAP server and the Internet isn't encrypted, packets between
the devices may be intercepted; this vulnerability is known as packet sniffing.

Question:
Talking about access control lists, an ACCESS_MASK is:

A) specific to the object you are trying to create.
B) not specific to the object you are trying to create.
C) always encrypted.
D) always 64 bit.

A)*Explanation: A fundamental means of enforcing privilege separation and controlling access are access control lists
(ACLs). Under this system, an ACCESS_MASK is specific to the object you are trying to create.

Question:
Which of the following is a method of capturing a virtual machine at a given point in time?

A) Snapshot
B) Photograph
C) Syslog
D) WMI

A)*Explanation: A snapshot is a method of capturing a virtual machine at a given point in time.

Question:
WPA is a strong form of wireless security because it uses ____________ to dynamically generate keys.

A) TKIP
B) AES
C) 3DES
D) Blowfish

A)*Explanation: WPA is a stronger form of wireless security than WEP because it uses Temporal Key Integrity
Protocol (TKIP) to dynamically generate keys.

Question:
Which cloud delivery model is implemented by a single organization, enabling it to be implemented behind a
firewall?

A) Private
B) Public
C) Community
D) Hybrid

A)*Explanation: A private cloud delivery model is implemented by a single organization and can be implemented
behind a firewall.

Question:
As more and more clients have been added to your network, the efficiency of the network has decreased
significantly. You're preparing a budget for next year, and you specificallywant to address this problem. Which of
the following devices acts primarily as a tool to improve network efficiency?

A) Hub
B) Switch
C) Router
D) PBX

B)*Explanation: Switches create virtual circuits between systems in a network. These virtual circuits are somewhat
private and reduce network traffic when used.

Question:
Talking about Antenna Placement, you want to know that the manner in which electromagnetic wave moves may
best be determined by:

A) Polarization
B) Shape
C) Height
D) Direction

A)*Explanation: The manner in which electromagnetic wave moves may be determined by polarization. Vertical
polarization means the wave moves up and down, while horizontal polarization means the wave moves left and
right.

Question:
802.1X is an IEEE standard that provides:

A) PNAC
B) RBAC
C) CBAC
D) TBAC

A)*Explanation: 802.1X is an IEEE standard that provides Port-based Network Access Control (PNAC). It makes use
of the physical access characteristics of the existing LAN infrastructure to perform authentication and authorization
of devices attached to the LAN.

Question:
Upper management has decreed that a firewall must be put in place immediately, before your site suffers an attack
similar to one that struck a sister company. Responding to thisorder, your boss instructs you to implement a packet
filter by the end of the week. A packet filter performs which function?

A) Prevents unauthorized packets from entering the network
B) Allows all packets to leave the network
C) Allows all packets to enter the network
D) Eliminates collisions in the network

A)*Explanation: Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a
type of firewall that blocks specified port traffic.

Question:
Switches are better than hubs because:

A) they can correct traffic jam problems
B) they can filter out viruses
C) they can filter out malware
D) they can serve as firewall
E) they can perform routing

A)*Explanation: A hub gathers groups of nodes together. A switch is better than a hub as it can correct traffic jam
problems, making sure data will go straight to its proper destination.

Question:
The risk-assessment component, in conjunction with the _______, provides the organization with an accurate
picture of the situation facing it.

A) RAC
B) ALE
C) BIA
D) RMG

C)*Explanation: The risk-assessment component, in conjunction with the business impact analysis (BIA), provides an
organization with an accurate picture of the situation it faces.

Question:
Tammy is having difficulty getting a signal from the AP on the second floor of her home office to the basement.
You recommend that she replace the antenna on the AP. What measurement should she use to compare gain
between possible antenna options?

A) ios
B) GB/s
C) MHz
D) dBi

D)*Explanation: The dBi number indicates the amount of gain the antenna offers.

Question:
NIDS is an advanced version of NIPS.

A) False
True
True only when the NIDS is vendor specific.
True only when the NIDS is patched.

A)* FalseExplanation: NIDS can inspect inbound and outbound network activity and identify suspicious patterns that may
be a sign of attack. NIPS is the next step up, and can carry out proactive actions against the detected threats. You
can think of NIPS as the advanced version of NIDS.

Question:
You're the chief security contact for MTS. One of your primary tasks is to document everything related to security
and create a manual that can be used to manage the company inyour absence. Which documents should be
referenced in your manual as the ones that identify the methods used to accomplish a given task?

A) Policies
B) Standards
C) Guidelines
D) BIA

C)*Explanation: Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than
policies or standards.

Question:
Which cloud delivery model could be considered an amalgamation of other types of delivery models?

A) Private
B) Public
C) Community
D) Hybrid

D)*Explanation: The hybrid delivery model can be considered an amalgamation of other types of delivery models.

Question:


What technology is used to simplify network setup by allowing a router to have the administrator push a button on
it to allow a new host to join?

A) WEP
B) WPA
C) WTLS
D) WPS

D)*Explanation: WPS (Wi-Fi Protected Setup) is intended to simplify network setup for home and small offices.

Question:
You want to perform log analysis for what purpose?

A) To try to make sense out of the captured traffic.
B) To try to implement IPS.
C) To try to backup the system state.
D) To try to enhance switching performance.

A)*Explanation: You want to capture unicast, multicast and broadcast traffic and perform log analysis - you do this to
try to make sense out of the captured traffic.

Question:
WPA provides payload integrity via AES.

A) False
True
True on certain devices only.
This is rather manufacturer specific.

A)*Explanation: WPA can provide payload integrity, but it does not use Advanced Encryption Standard (AES). It is
still more secure than WEP.

Question:
What types of systems utilize parallel processing (improving performance and availability) and add redundancy?

A) Loaded
B) Collected
C) Clustered
D) Dispersed

C)*Explanation: Clustered systems utilize parallel processing (improving performance and availability) and add
redundancy.