Filters
Question type

Study Flashcards

A correlation engine aggregates and correlates content from different sources to uncover an attack.

A) True
B) False

Correct Answer

verifed

verified

An administrator needs to examine FTP commands that are being passed to a server.What port should the administrator be monitoring?


A) 19
B) 20
C) 21
D) 22

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?


A) malware management
B) inventory permissions
C) application whitelist
D) application control

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

What Microsoft Windows feature prevents attackers from using buffer overflows to execute malware?

Correct Answer

verifed

verified

Data Execu...

View Answer

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?


A) bridge
B) router
C) switch
D) hub

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Discuss the Infrastructure as a Service (IaaS)model used in cloud computing.

Correct Answer

verifed

verified

In the Infrastructure as a Service (IaaS...

View Answer

A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.

A) True
B) False

Correct Answer

verifed

verified

Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?


A) IaaS
B) cloud computing
C) virtualization
D) PaaS

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

In what type of cloud computing does the customer have some control over the operating systems,storage,and their installed applications?


A) Application as a Service
B) Infrastructure as a Service
C) Software as a Service
D) System as a Service

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Explain the basic operating principals used in software defined networking.

Correct Answer

verifed

verified

An SDN virtualizes parts of the physical...

View Answer

What secure protocol is recommended for Network address translation?


A) SRTP
B) S/MIME
C) IMAP
D) IPsec

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?


A) PaaS
B) SDN
C) VDI
D) SaaS

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What specific issues are associated with log management? (Choose all that apply. )


A) The multiple devices generating logs.
B) The different log formats.
C) The fast network transfer speeds.
D) The large volume of data that needs to be logged

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

What type of switch is used to combine multiple network connections into a single link?


A) core switch
B) gateway switch
C) aggregation switch
D) access switch

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Type I hypervisors run on the host operating system.

A) True
B) False

Correct Answer

verifed

verified

How can a network of physical devices be grouped into logical units,regardless of what network switches they may be connected to?


A) VLAN
B) subnets
C) IP address
D) MAC address

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

File integrity check (FIC)is a service that can monitor any changes made to computer files,such as operating system files.

A) True
B) False

Correct Answer

verifed

verified

Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.


A) WINS
B) NIS
C) TACACS+
D) DNS

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch,what switch technology will need to be supported?


A) interface capture
B) port identity
C) port snooping
D) port mirroring

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

On and SDN network,what specific unit gives traffic the permission to flow through the network?


A) SDN router
B) SDN firewall
C) SDN gateway
D) SDN controller

E) B) and D)
F) C) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer