Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
47 Cards in this Set
- Front
- Back
- 3rd side (hint)
Question: |
A) totally unique |
A)* and |
|
Question: |
A) MAC filter |
A)*Explanation: You may use a MAC filter to filter the MAC addresses of wireless clients that are allowed to connect |
|
Question: |
A) MAC filter |
B)*Explanation: A flood guard is a protection feature built into many firewalls that allows the administrator to tweak |
|
Question: |
A) Dipole |
A)*Explanation: Talking about antenna types, a dipole antenna has two identical conductive elements bilaterally |
|
Question: |
A) False |
A)* FalseExplanation: Firewall configuration, administration and operational procedures should be documented. |
|
Question: |
A) WTLS |
C)*Explanation: The Wireless Transaction Protocol (WTP) provides services similar to TCP and UDP for WAP. |
|
Question: |
A) IMAP |
D)*Explanation: SFTP uses only TCP ports. IMAP, LDAP, and FTPS all use both TCP and UDP ports. |
|
Question: |
A) WEP |
C)*Explanation: Wireless Application Protocol (WAP) is an open international standard for applications that use |
|
Question: |
A) Multitenancy |
B)*Explanation: Elasticity is a feature of cloud computing that involves dynamically provisioning (or deprovisioning) |
|
Question: |
A) TKIP |
B)*Explanation: The term network lock is synonymous with MAC filtering. |
|
Question: |
A) All the latest patches are applied. |
A)* Explanation: Routing takes place at layer 3. If it is compromised, then your network will be in great danger. You |
|
Question: Remote access allows your users to dial in from any place that has: |
A) a normal phone connection |
A)*Explanation: Remote access allows your users to dial in from any place that has a normal phone connection. Once |
|
Question: |
A) RAID 0+1 |
B)*Explanation: RAID 6 writes parity to two different drives, thus providing fault tolerance to the system even in the |
|
Question: |
A) spam filter software |
A)*Explanation: To protect against email spamming, you should install spam filter software, and consider removing |
|
Question: |
A) Risk acceptance |
E)*Explanation: Risk transference involves sharing some of the risk burden with someone else, such as an insurance |
|
Question: |
A)* IPSec |
All*Explanation: A protocol is a language that both hosts must follow in order to communicate. The different available |
|
Question: Which of the following are multiport devices that improve network efficiency? |
A) Switches |
A)*Explanation: Switches are multiport devices that improve network efficiency. A switch typically has a small |
|
Question: |
A) DDOS attacks |
A)*Explanation: Distributed denial of service (DDOS) uses a large number of compromised hosts to flood a target |
|
Question: |
A) Determining the number and placement of APs for providing adequate coverage. |
A)*Explanation: A site survey has the goal of determining the number and placement of APs for providing adequate |
|
Question: |
A) Risk acceptance |
A)*Explanation: Risk acceptance necessitates an identified risk that those involved understand the potential cost or |
|
Question: |
A) subnetting |
A)* Explanation: With a router, hosts attached to the router ports are not on the same subnet. This is about |
|
Question: |
A) SFTP |
A)* SFTP |
|
Question: What can be used to offer an extra layer of protection on the network for those hosts running behind the firewall? |
A) DMZ |
A)*Explanation: A demilitarized zone (DMZ) is a small IP subnetwork. It sits between the trusted internal LAN and |
|
Question: |
A) Arithmetical |
D)*Explanation: A heuristic system uses algorithms to analyze the traffic passing through the network. |
|
Question: |
A) Public and community |
B)*Explanation: While a hybrid cloud could be any mixture of cloud delivery models, it is usually a combination of |
|
Question: |
A) IPSec |
A)*Explanation: IPSec provides network security for tunneling protocols. IPSec can be used with many different |
|
Question: |
A) WAP |
C)*Explanation: Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to that on a |
|
Question: |
A) Proxy |
C)*Explanation: A load balancer can be implemented as a software or hardware solution and is usually associated |
|
Question: |
A) Packet sniffing |
A)*Explanation: When the interconnection between the WAP server and the Internet isn't encrypted, packets between |
|
Question: |
A) specific to the object you are trying to create. |
A)*Explanation: A fundamental means of enforcing privilege separation and controlling access are access control lists |
|
Question: |
A) Snapshot |
A)*Explanation: A snapshot is a method of capturing a virtual machine at a given point in time. |
|
Question: |
A) TKIP |
A)*Explanation: WPA is a stronger form of wireless security than WEP because it uses Temporal Key Integrity |
|
Question: |
A) Private |
A)*Explanation: A private cloud delivery model is implemented by a single organization and can be implemented |
|
Question: |
A) Hub |
B)*Explanation: Switches create virtual circuits between systems in a network. These virtual circuits are somewhat |
|
Question: |
A) Polarization |
A)*Explanation: The manner in which electromagnetic wave moves may be determined by polarization. Vertical |
|
Question: |
A) PNAC |
A)*Explanation: 802.1X is an IEEE standard that provides Port-based Network Access Control (PNAC). It makes use |
|
Question: |
A) Prevents unauthorized packets from entering the network |
A)*Explanation: Packet filters prevent unauthorized packets from entering or leaving a network. Packet filters are a |
|
Question: |
A) they can correct traffic jam problems |
A)*Explanation: A hub gathers groups of nodes together. A switch is better than a hub as it can correct traffic jam |
|
Question: |
A) RAC |
C)*Explanation: The risk-assessment component, in conjunction with the business impact analysis (BIA), provides an |
|
Question: |
A) ios |
D)*Explanation: The dBi number indicates the amount of gain the antenna offers. |
|
Question: |
A) False |
A)* FalseExplanation: NIDS can inspect inbound and outbound network activity and identify suspicious patterns that may |
|
Question: |
A) Policies |
C)*Explanation: Guidelines help clarify processes to maintain standards. Guidelines tend to be less formal than |
|
Question: |
A) Private |
D)*Explanation: The hybrid delivery model can be considered an amalgamation of other types of delivery models. |
|
Question: What technology is used to simplify network setup by allowing a router to have the administrator push a button on |
A) WEP |
D)*Explanation: WPS (Wi-Fi Protected Setup) is intended to simplify network setup for home and small offices. |
|
Question: |
A) To try to make sense out of the captured traffic. |
A)*Explanation: You want to capture unicast, multicast and broadcast traffic and perform log analysis - you do this to |
|
Question: |
A) False |
A)*Explanation: WPA can provide payload integrity, but it does not use Advanced Encryption Standard (AES). It is |
|
Question: |
A) Loaded |
C)*Explanation: Clustered systems utilize parallel processing (improving performance and availability) and add |