Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
When using SIP, what term is used to describe end-user devices, which may include workstations, tablet computers, smartphones, or IP phones?
|
user agent client
|
|
The SSH service listens on what TCP port?
|
22 |
|
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, where should the historian be placed
|
DMZ
|
|
The first step of a response policy should be to secure the area
|
False
|
|
In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?
|
Carrier Ethernet Transport
|
|
Which element of H.323 is a device that provides translation between network devices running the H.323 signaling protocols and devices running other types of signaling protocols?
|
H.323 gatekeeper
|
|
How often should administrators and network users be required to change their password? |
60 days |
|
Cipher locks are not designed for physical security, such as on an outside door. |
True |
|
The best 802.11n signal can travel approximately how far? |
1/4 mile |
|
Digital certificates are issued by organizations known as what term? |
certification authorities |
|
The DTE or endpoint device for a leased line is known as which device below? |
CSU/DSU |
|
When performing inventory on software packages, which of the following is not something that should be inventoried? |
proprietary source code |
|
What team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties? |
public relations specialist |
|
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console. |
True |
|
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications? |
5060 |
|
What type of VLAN automatically receives all untagged frames? |
Native VLAN |
|
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring the interface as what option below? |
A trunk port |
|
The first iteration of STP was defined in what IEEE standard below? |
802.1d |
|
What version of xDSL is the most popular? |
ADSL |
|
What option below is not an encryption algorithm method that is used by SSH?
|
SHA-2
|
|
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
|
False
|
|
What protocol is used to provide a common language between virtualized service applications and a network's physical devices?
|
OpenFlow
|
|
What security principle provides proof of delivery and proof of the sender's identity?
|
non-repudiation
|
|
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?
|
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?
|
|
What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?
|
TKIP
|
|
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
|
160 bit
|
|
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
|
out-of-band management
|
|
In order to allow communication between VLANs for exchange of data, what must be used?
|
a router
|
|
PPP can support several types of Network layer protocols that might use the connection
|
True
|
|
Which of the following is NOT a step that should be taken as part of a response policy?
|
Attempt to access files to determine if they are compromised
|