• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

Which of the following passwords is best to use on a system containing highly sensitive information?

0OxqH}ml2-wOn

Which of the following is a technique you can use to help secure a wireless network? (Choose all that apply.)

MAC address filtering AND WPA2

Which of these protocols is used for VPNs? (Choose all that apply.)

PPTP, SSTP, AND L2TP

How do VPNs accomplish the “private” part of a virtual private network?

Tunneling

Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can’t respond to normal traffic?


DoS

Which of the following is a guideline for creating a security policy?

A security policy should be enforceable.

Which of the following is a component of a security policy? (Choose all that apply.)


Authentication policy AND Privacy policy

Which of the following questions must be answered before determining what level of security a network requires? (Choose all that apply.)

What’s being protected? AND From whom should data be protected?

Which of the following should be a common element in any level of security policy? (Choose all that apply.)

Backup procedures AND Virus protection


Which phrase from the following list best completes this sentence? If there’s access to the equipment, there’s no ______.

physical security

Which of the following is a requirement for rooms housing network servers?

Adequate cooling

Which procedure specifies what resources users can access and the tasks they can perform on a network?

Authorization

If you want to allow a blank password on a Windows computer, which of the following do you set the password minimum length to?

0 (zero)

If you want to prevent password guessing to foil intruders, you should enable which of the following?

Account lockout

Which authentication protocol is used in a Windows domain environment?

Kerberos

Which of the following is a credential category? (Choose all that apply.)

Knowledge AND Inherence AND Possession

Which of the following is a method IPsec uses to authenticate the identity of communicating devices? (Choose all that apply.)

Kerberos AND Digital certificates

To encrypt data stored on a hard drive on a Windows Server computer, you should use which of the following?

EFS

Fire walls can filter packets based on which of the following? (Choose all that apply.)


Source address AND Protocol

If network administrators want to be informed when an attempt has been made to compromise the network, what should they use?

IDS

Which VPN mode should you use if you want to establish a secure tunnel between a main office and a branch office?

Site-To-Site

Where’s a common place to install an NIDS?

In the DMZ

What device should you consider installing if you want countermeasures to take place when an attack is detected?

IPS

In which of the following areas does a WAN differ from an internet work? (Choose all that apply.)

WANs use service providers for the network connection AND WANs use serial communication technologies that can span miles.

Which of the following is a device used to make WAN connections? (Choose all that apply.)

CSU/DSU AND Router

Which of the following best describes a digital signal?

A series of binary values

For what purpose is a CSU/DSU used?

Creates a digital connection between a LAN device and the WAN link


Which of the following is a common WAN connection method? (Choose all that apply.)

Circuit switched AND Packet switched

Which of the following is true about ISDN?

It uses a terminal adapter to connect to the network.

Which of the following is a typical situation in which leased lines should be considered?(Choose all that apply.)

24/7 access is required AND Fast upstream and downstream communications are needed.

Which of the following combines several communication streams into a single faster communication stream?


Multiplexing

Which physical topology does SONET readily support? (Choose all that apply.)

Point-to-point AND Star AND Ring


Which of the following technologies uses packet-switching? (Choose all that apply.)


Frame relay AND X.25

Which of the following technologies provides permanent virtual circuits? (Choose all that apply.)

Frame relay AND X.25

Which technology uses 53-byte cells?

ATM

To maintain security, WAN connections over the Internet should use which of the following?

VPN

What type of device is required to connect to a dedicated digital communication line?

CSU/DSU

Which term best describes the place in a WAN connection where the customer’s responsibility ends and the provider’s responsibility begins?

Demarcation point

Which of the following places data on the local loop?

DCE

Which of the following is the equipment at the customer site that’s the responsibility of the customer?


CPE

Which of the following is a VPN protocol supported by Windows remote access? (Choose all that apply.)

PPTP AND L2TP AND SSTP

Which of the following is a component of the PPP protocol? (Choose all that apply.)

Link control protocol AND NCP

Which of the following can best be described as developing applications by using a service provider’s development tools and infrastructure?

Hosted platforms

Which wireless WAN technology has a standard for fixed and mobile devices?

WiMAX

Which wireless WAN technology might not be suitable for voice applications because of latency?

Satellite