Deck 11: Network Management and Security

ملء الشاشة (f)
exit full mode
سؤال
A ____ looks at the long-term operation of the business, so a business should develop two plans.

A) business continuity plan
B) disaster recovery plan
C) business recovery plan
D) disaster prevention plan
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A denial-of-service attack (DOS attack) is characterized by an attempt to prevent legitimate users of a service from using that service.
سؤال
A(n) ____ is a stand-alone hardware unit that connects to the network or a software program running on a network host, collecting statistical information about the network performance.

A) program analyzer
B) packet analyzer
C) interface analyzer
D) protocol analyzer
سؤال
____________________ hardening involves updating or patching applications as required, as well as properly administering usernames and passwords (changing default usernames and passwords).
سؤال
____________________ is a security measure that uses the public network infrastructure, such as the Internet, as part of a Virtual Private Network.
سؤال
A ____ uses a special switch (typically utilizing Fibre Channel technology) to connect servers and storage devices on their own physical network.

A) NAS
B) SAN
C) SAD
D) SAS
سؤال
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.

A) private LAN
B) software LAN
C) segmented LAN
D) virtual LAN
سؤال
____ is a technology where high-capacity file storage is directly connected to the network.

A) NAS
B) SAN
C) MAS
D) NAD
سؤال
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.

A) computer virus
B) Trojan
C) worm
D) rootkit
سؤال
A(n) ____________________ allows you to connect the keyboard, video, and mouse signals from two or more computers to a single keyboard, video monitor, and mouse.
سؤال
A(n) ____________________ is a program that replicates itself, but does not necessarily infect other programs.
سؤال
Network security begins with the security measures in place on the server.
سؤال
A(n) ____________________ device is a network device that you can manage via a network connection, either through an ordinary browser or through special management software that comes with the device.
سؤال
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit, requiring the most amount of inspection time per packet.
سؤال
Integrity of information is achieved through encryption.
سؤال
____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.

A) Network
B) System
C) Application
D) Operating system
سؤال
Network management is one of the most important tasks that is performed in a networked computer environment.
سؤال
The ____ module converts the server's keyboard, video, and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.

A) AICC
B) UICC
C) RICC
D) GICC
سؤال
A(n) ____ combines traffic sniffing with analysis techniques.

A) firewall
B) intrusion detection system
C) router
D) application firewall
سؤال
____ hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network.

A) Network
B) System
C) Application
D) Operating system
سؤال
Match between columns
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Network security
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Disaster recovery
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Cold site
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Warm site
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Hot site
Has all equipment required to maintain network communication and other services as well as current data
Network security
Has all equipment required to maintain network communication and other services as well as current data
Disaster recovery
Has all equipment required to maintain network communication and other services as well as current data
Cold site
Has all equipment required to maintain network communication and other services as well as current data
Warm site
Has all equipment required to maintain network communication and other services as well as current data
Hot site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Network security
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Disaster recovery
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Cold site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Warm site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Hot site
Includes the methods used to regulate what packets are transmitted
Network security
Includes the methods used to regulate what packets are transmitted
Disaster recovery
Includes the methods used to regulate what packets are transmitted
Cold site
Includes the methods used to regulate what packets are transmitted
Warm site
Includes the methods used to regulate what packets are transmitted
Hot site
Includes planning and methodologies designed to reduce or eliminate threats
Network security
Includes planning and methodologies designed to reduce or eliminate threats
Disaster recovery
Includes planning and methodologies designed to reduce or eliminate threats
Cold site
Includes planning and methodologies designed to reduce or eliminate threats
Warm site
Includes planning and methodologies designed to reduce or eliminate threats
Hot site
سؤال
List and describe the different types of hardening.
سؤال
What is a firewall?
سؤال
Discuss the advantage of having a disk image.
سؤال
List and describe five areas to consider in User Management.
سؤال
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Network Management and Security
1
A ____ looks at the long-term operation of the business, so a business should develop two plans.

A) business continuity plan
B) disaster recovery plan
C) business recovery plan
D) disaster prevention plan
A
2
A denial-of-service attack (DOS attack) is characterized by an attempt to prevent legitimate users of a service from using that service.
True
3
A(n) ____ is a stand-alone hardware unit that connects to the network or a software program running on a network host, collecting statistical information about the network performance.

A) program analyzer
B) packet analyzer
C) interface analyzer
D) protocol analyzer
D
4
____________________ hardening involves updating or patching applications as required, as well as properly administering usernames and passwords (changing default usernames and passwords).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
____________________ is a security measure that uses the public network infrastructure, such as the Internet, as part of a Virtual Private Network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ uses a special switch (typically utilizing Fibre Channel technology) to connect servers and storage devices on their own physical network.

A) NAS
B) SAN
C) SAD
D) SAS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ____ is a partitioning of the ports on a VLAN-capable switch into LAN groups whose traffic is isolated from each other.

A) private LAN
B) software LAN
C) segmented LAN
D) virtual LAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is a technology where high-capacity file storage is directly connected to the network.

A) NAS
B) SAN
C) MAS
D) NAD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ____ is software that has been written to enter a computer system and corrupt the files on the hard drive.

A) computer virus
B) Trojan
C) worm
D) rootkit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____________________ allows you to connect the keyboard, video, and mouse signals from two or more computers to a single keyboard, video monitor, and mouse.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
A(n) ____________________ is a program that replicates itself, but does not necessarily infect other programs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
Network security begins with the security measures in place on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n) ____________________ device is a network device that you can manage via a network connection, either through an ordinary browser or through special management software that comes with the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
A proxy-service firewall provides a combination of packet-filtering and proxy-service in one unit, requiring the most amount of inspection time per packet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
Integrity of information is achieved through encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ hardening involves disabling non-essential protocols and services, installing up-to-date service packs, patches, and hotfixes, and properly establishing access control permissions.

A) Network
B) System
C) Application
D) Operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
Network management is one of the most important tasks that is performed in a networked computer environment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ____ module converts the server's keyboard, video, and mouse signals for transport over Cat 5 UTP cable and provides interfacing for USB and PS/2 mice.

A) AICC
B) UICC
C) RICC
D) GICC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n) ____ combines traffic sniffing with analysis techniques.

A) firewall
B) intrusion detection system
C) router
D) application firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ hardening involves the use of routers, firewalls, IDS systems, and fault tolerance to help provide a protected and highly-available network.

A) Network
B) System
C) Application
D) Operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Network security
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Disaster recovery
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Cold site
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Warm site
Has the minimal networking hardware required to maintain network communication, but requires restoration from the most recent backup to become operational
Hot site
Has all equipment required to maintain network communication and other services as well as current data
Network security
Has all equipment required to maintain network communication and other services as well as current data
Disaster recovery
Has all equipment required to maintain network communication and other services as well as current data
Cold site
Has all equipment required to maintain network communication and other services as well as current data
Warm site
Has all equipment required to maintain network communication and other services as well as current data
Hot site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Network security
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Disaster recovery
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Cold site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Warm site
Has no networking equipment or backup data, just electricity, space for equipment, and possibly bathrooms
Hot site
Includes the methods used to regulate what packets are transmitted
Network security
Includes the methods used to regulate what packets are transmitted
Disaster recovery
Includes the methods used to regulate what packets are transmitted
Cold site
Includes the methods used to regulate what packets are transmitted
Warm site
Includes the methods used to regulate what packets are transmitted
Hot site
Includes planning and methodologies designed to reduce or eliminate threats
Network security
Includes planning and methodologies designed to reduce or eliminate threats
Disaster recovery
Includes planning and methodologies designed to reduce or eliminate threats
Cold site
Includes planning and methodologies designed to reduce or eliminate threats
Warm site
Includes planning and methodologies designed to reduce or eliminate threats
Hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
List and describe the different types of hardening.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is a firewall?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Discuss the advantage of having a disk image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
List and describe five areas to consider in User Management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
List five disaster recovery safeguards that can be used to help guarantee a relatively quick and painless recovery in the event that a disaster occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.