Deck 10: Infrastructure Security

ملء الشاشة (f)
exit full mode
سؤال
Preventing physical access to a server by an unauthorized individual is the

A)Responsibility of the CFO of an organization
B)Primary security concern for a system administrator
C)An organization's least important concern
D)Reason we implement firewalls
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
_____________ is/are computers in a network that host applications and data for everyone to share.

A)Linux boxes
B)Servers
C)Firewalls
D)Cryptography
سؤال
Centralized monitoring of the health of the network is the function of a

A)File server
B)SNMP
C)NOC
D)TOC
سؤال
________ are types of magnetic media.

A)CDR,CDRW,DVD
B)Linux,Windows,Oracle
C)Hard drives,diskettes,tape
D)Keyboards,mouse,monitor
سؤال
Media can be divided into three categories:

A)Paper,plastic,cloth
B)Magnetic,optical,and electronic
C)Confidential,integrity,authority
D)Red,yellow,and blue
سؤال
________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate

A)Laser
B)Optical
C)Magnetic
D)Static
سؤال
You are building a network and need to connect three different network segments,including the Internet.The device must enforce security policies and perform stateful packet filtering.The device you would use is a

A)Switch
B)Bridge
C)Router
D)Firewall
سؤال
________ are applications designed to detect,log,and respond to unauthorized A.network or host use,both in real time and after the fact

A)Windows Operating System
B)Intrusion detection systems (IDS)
C)Firewalls
D)Twisted wire pairs
سؤال
Which of the following is an extension of the public telephone network into a business?

A)PBX
B)COTS
C)SNMP
D)SMTP
سؤال
You are building a small network in the office.You will need to connect two different network segments that have different network addresses.What device will you use connect them?

A)Hub
B)Router
C)Switch
D)Server
سؤال
What protocol is used to manage IP address space?

A)ICMP
B)DHCP
C)TCP
D)SNMP
سؤال
Which operating system is immune to virus attacks?

A)Windows 7
B)Red Hat Linux
C)Mac OS X
D)No operating system is immune.
سؤال
You are building a network and need to connect five computers in an office.They will be on the same network segment and you should be able to perform some security functions such as port address security.What device would you use to connect the computers?

A)Switch
B)Hub
C)Router
D)Server
سؤال
_______ are characterized by the use of a laser to read data stored on a physical device.

A)Authentication rules
B)FTP sites
C)Modems
D)Optical media
سؤال
The following are steps in securing a workstation EXCEPT:

A)Install NetBIOS and IPX
B)Install antivirus
C)Remove unnecessary software
D)Disable unnecessary user accounts
سؤال
Which device converts analog signals to digital signals and vice versa?

A)Switch
B)Hub
C)Modem
D)VPN
سؤال
A virtual private network (VPN)is a construct used to provide

A)Users with their own web space on the network
B)An area of relaxation for employees
C)Secure communication channel between users across public networks such as the Internet
D)A learning area for programming languages
سؤال
A hub operates at

A)Layer 1,the physical layer
B)Layer 2,the data link layer
C)Layer 2,the MAC layer
D)Layer 3,the network layer
سؤال
A(n)_________ is a network device that can be hardware,software,or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet

A)blister pack
B)entity relationship diagram
C)server
D)firewall
سؤال
Network access control is

A)A Microsoft technology for controlling network access
B)A security methodology involved in managing endpoints as they connect on a case-by-case basis
C)The use of ACLs to permit network access
D)MAC filtering on wireless devices
سؤال
The rules that define what traffic is permissible and what traffic is to be blocked or denied are called _______________.
سؤال
A bridge works on layer 3 of the OSI model.
سؤال
Worms are software that attaches itself to a file and then executes on a machine.
سؤال
It is difficult to make precise connections with fiber optic cables,but they are inexpensive.
سؤال
A network traffic management device used to connect different network segments together is called a(n)_______________.
سؤال
A computer in a network that hosts applications and data for everyone to share is called a(n)_______________.
سؤال
_______________ are devices designed to detect,log,and respond to unauthorized network or host use,both in real time and after the fact.
سؤال
The intentions of computer virus writers have changed over the years,from wanting to simply spread a virus and be noticed,to the work of today's stealthy botnet-creating criminals.
سؤال
Managing the endpoints on a case-by-case basis as they connect is a security methodology known as _______________.
سؤال
The machine that sits on a desktop and is used for sending and reading everyday e-mail,creating reports,or playing games is called the _______________.
سؤال
The point of entry from a wireless device to a wired network is performed at a device called a(n)_______________.
سؤال
_______________ has a foil shield around the pairs of wire to provide extra shielding from electromagnetic interference.
سؤال
SMTP is a protocol for managing functions between devices.
سؤال
The most common implementation of VPN is via IPsec
سؤال
Hubs are the most common device used for connecting computers on a local area network.
سؤال
A(n)_______________ is a card with a connector port of a particular type of network connection,either Ethernet or Token Ring.
سؤال
Category 5 cable is rated for 10-Mbps Ethernet.
سؤال
Infrared works like wireless in that it can penetrate walls.
سؤال
Switches create one big collision domain for all connected devices.
سؤال
Multiple operating systems can be operated concurrently on the same hardware using _______________.
سؤال
What are the four common methods for connecting equipment at the physical layer?
سؤال
What are the different types of removable media?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Infrastructure Security
1
Preventing physical access to a server by an unauthorized individual is the

A)Responsibility of the CFO of an organization
B)Primary security concern for a system administrator
C)An organization's least important concern
D)Reason we implement firewalls
B
2
_____________ is/are computers in a network that host applications and data for everyone to share.

A)Linux boxes
B)Servers
C)Firewalls
D)Cryptography
B
3
Centralized monitoring of the health of the network is the function of a

A)File server
B)SNMP
C)NOC
D)TOC
C
4
________ are types of magnetic media.

A)CDR,CDRW,DVD
B)Linux,Windows,Oracle
C)Hard drives,diskettes,tape
D)Keyboards,mouse,monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Media can be divided into three categories:

A)Paper,plastic,cloth
B)Magnetic,optical,and electronic
C)Confidential,integrity,authority
D)Red,yellow,and blue
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
________ media store data through the rearrangement of magnetic particles on a nonmagnetic substrate

A)Laser
B)Optical
C)Magnetic
D)Static
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
You are building a network and need to connect three different network segments,including the Internet.The device must enforce security policies and perform stateful packet filtering.The device you would use is a

A)Switch
B)Bridge
C)Router
D)Firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
________ are applications designed to detect,log,and respond to unauthorized A.network or host use,both in real time and after the fact

A)Windows Operating System
B)Intrusion detection systems (IDS)
C)Firewalls
D)Twisted wire pairs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is an extension of the public telephone network into a business?

A)PBX
B)COTS
C)SNMP
D)SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
You are building a small network in the office.You will need to connect two different network segments that have different network addresses.What device will you use connect them?

A)Hub
B)Router
C)Switch
D)Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
What protocol is used to manage IP address space?

A)ICMP
B)DHCP
C)TCP
D)SNMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which operating system is immune to virus attacks?

A)Windows 7
B)Red Hat Linux
C)Mac OS X
D)No operating system is immune.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
You are building a network and need to connect five computers in an office.They will be on the same network segment and you should be able to perform some security functions such as port address security.What device would you use to connect the computers?

A)Switch
B)Hub
C)Router
D)Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
_______ are characterized by the use of a laser to read data stored on a physical device.

A)Authentication rules
B)FTP sites
C)Modems
D)Optical media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The following are steps in securing a workstation EXCEPT:

A)Install NetBIOS and IPX
B)Install antivirus
C)Remove unnecessary software
D)Disable unnecessary user accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which device converts analog signals to digital signals and vice versa?

A)Switch
B)Hub
C)Modem
D)VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A virtual private network (VPN)is a construct used to provide

A)Users with their own web space on the network
B)An area of relaxation for employees
C)Secure communication channel between users across public networks such as the Internet
D)A learning area for programming languages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A hub operates at

A)Layer 1,the physical layer
B)Layer 2,the data link layer
C)Layer 2,the MAC layer
D)Layer 3,the network layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n)_________ is a network device that can be hardware,software,or a combination of both whose purpose is to enforce a security policy across its connections to external networks such as the Internet

A)blister pack
B)entity relationship diagram
C)server
D)firewall
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Network access control is

A)A Microsoft technology for controlling network access
B)A security methodology involved in managing endpoints as they connect on a case-by-case basis
C)The use of ACLs to permit network access
D)MAC filtering on wireless devices
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
The rules that define what traffic is permissible and what traffic is to be blocked or denied are called _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
A bridge works on layer 3 of the OSI model.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Worms are software that attaches itself to a file and then executes on a machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
It is difficult to make precise connections with fiber optic cables,but they are inexpensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A network traffic management device used to connect different network segments together is called a(n)_______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
A computer in a network that hosts applications and data for everyone to share is called a(n)_______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
_______________ are devices designed to detect,log,and respond to unauthorized network or host use,both in real time and after the fact.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
The intentions of computer virus writers have changed over the years,from wanting to simply spread a virus and be noticed,to the work of today's stealthy botnet-creating criminals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Managing the endpoints on a case-by-case basis as they connect is a security methodology known as _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The machine that sits on a desktop and is used for sending and reading everyday e-mail,creating reports,or playing games is called the _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The point of entry from a wireless device to a wired network is performed at a device called a(n)_______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
_______________ has a foil shield around the pairs of wire to provide extra shielding from electromagnetic interference.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
SMTP is a protocol for managing functions between devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The most common implementation of VPN is via IPsec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Hubs are the most common device used for connecting computers on a local area network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n)_______________ is a card with a connector port of a particular type of network connection,either Ethernet or Token Ring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Category 5 cable is rated for 10-Mbps Ethernet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Infrared works like wireless in that it can penetrate walls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Switches create one big collision domain for all connected devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Multiple operating systems can be operated concurrently on the same hardware using _______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the four common methods for connecting equipment at the physical layer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
What are the different types of removable media?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.