Shared Flashcard Set

Details

Exam 1 Info Sec
exam 1
42
Computer Networking
Undergraduate 4
11/02/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
What type of monitoring compares network traffic, activities, transactions or behavior against a database of known attack patterns?
Definition
signature
Term
In what type of cloud computing does the customer have the highest level of control?
Definition
cloud infrastructure as a service
Term

 

The capability for devices to exchange low-level control messages is provided by which of the following protocols?

Definition
ICMP
Term

 

When a network uses a single public IP address and each outgoing TCP packet uses a different port to allow for proper translation, which networking technology is being used?

Definition
PAT
Term
The standard TCP/IP protocol uses IP addresses which are how many bytes in length?
Definition
4
Term

 

Which vendor neutral protocol implements support for VLAN tagging?

Definition
802.11Q
Term

Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of which of the following standards?



Definition
IEEE 802.1x
Term

 

Which of the following network addresses is not a private IP address network?

10.4.5.0

172.63.255.0

Definition
172.63.255.0
Term
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application. (T/F)
Definition
False
Term

 

The __________ is a high-speed storage network protocol that can transmit up to 16 gigabits per second.

Definition
fibre channel
Term
A network _____________ isolates connected devices by learning MAC addresses and only sending frames intended for specific MAC addresses to the ports they are connected to unless the MAC address is unknown.
Definition
switch
Term

Which of the following is not a component of an IP packet that a firewall rule can use for filtering purposes?

 

 

Source address

 

Destination port

 

Direction

 

Intent

Definition
Intent
Term

When using SNMPv1 or SNMPv2, which piece of information is required to view information from an agent?

 

 

entity

 

community string

 

MIB

 

OID

Definition
community string
Term

Broadcast storms can be prevented by using loop prevention technology. Which of the following can be used to help prevent loops?

 

 

Virtual trunking protocol

 

Dijkstra's algorithm

 

802.11x

 

802.1d

Definition
802.1d
Term
Workgroup switches must work faster than core switches. (T/F)
Definition
False
Term
A _____________ is a worker who works occasionally or regularly from a home office.
Definition
telecommuter
Term

 

With operating system virtualization, a(n) _____________ system is the native operating system to the hardware.

Definition
host
Term

What are the values attributed to a system of beliefs that help the individual distinguish right from wrong?

 

 

morals

 

ethics

 

standards

 

morays

Definition
morals
Term

A written document that states how an organization plans to protect the company's information technology assets is a(n):

 

 

security policy

 

guideline

 

security procedure

 

standard

Definition
security policy
Term

The components required to identify, analyze and contain an incident are defined as:

 

 

vulnerability response

 

incident response

 

risk response

 

threat response

Definition
incident response
Term

What type of plans include procedures to address redundancy and fault tolerance as well as data backups?

 

 

enterprise recovery

 

disaster recovery

 

business recovery

 

emergency recovery

Definition
disaster recovery
Term

The process of identifying exposure to threats, creating preventive and recovery procedures and then testing them to determine if they are sufficient is known as:

 

 

business continuity planning and testing

 

disaster planning

 

business management planning and testing

 

enterprise disaster planning

Definition

business continuity planning and testing

 
Term

Due to the potential impact of changes that can affect all users in an organization and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?

 

 

change management team

 

incident response team

 

security control team

 

compliance team

Definition
change management team
Term

The goal of an IT contingency plan is to ensure that the business will continue to function at an acceptable level in the face of a major IT incident or disaster.

 

 

 

Definition
true
Term

Audits serve to verify that the security protections enacted by an organization are being followed and that corrective actions can be swiftly implemented before an attacker exploits a vulnerability.

 

 

 

Definition
true
Term

 

Generally, _____________ focuses on restoring computing and technology resources to their former state.

Definition
disaster recovery
Term

When a company needs to identify mission-critical business functions and quantify the impact a loss of such functions may have on the organization in terms of it's operational and financial position, which of the following should be performed?

 

 

business risk analysis

 

business alert assessment

 

business productivity analysis

 

business impact analysis

Definition
business impact analysis
Term

A written document that states how an organization plans to protect the company's information technology assets is a(n):

 

 

security policy

 

guideline

 

security procedure

 

standard

Definition
security policy
Term

How can an administrator keep devices powered when power is interrupted?

 

 

uninterruptible power supply

 

redundant power supply

 

uninterruptible system supply

 

interruptible power supply

Definition
uninterruptible power supply
Term

Which of the following is a type of cluster that is used to provide high-availability applications that require a high level of read and write actions, such as databases, messaging systems and file and print services?

 

 

symmetric network

 

symmetric server

 

asymmetric network

 

asymmetric server

Definition
asymetric server
Term

In which type of server cluster can services fail over from downed servers to functional servers?

 

 

symmetric network

 

asymmetric network

 

symmetric server

 

asymmetric server

Definition
symmetric server
Term

Which of the following options best describes a policy?

 

 

A collection of requirements specific to the system or procedure that must be met by everyone

 

A list of all items that have a positive economic value

 

A collection of suggestions that should be implemented

 

A document that outlines specific requirements or rules that must be met

Definition
a document that outlines specific requirements or rules that must be met
Term
When designing a security policy, many organizations follow a standard set of __________.
Definition
principles
Term

A service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party and any guarantees of service is known as:

 

service level agreement

 

recovery point objective

 

service point agreement

 

recovery time objective

Definition
service level agreement
Term

Which of the following terms defines the study of what a group of people understand to be good and right behavior and how people make those judgments?

 

 

values

 

morals

 

ethics

 

standards

 
Definition
ethics
Term

Duplicate image backups are considered a primary key to uncovering evidence because they create exact replicas of the crime scene.

 

 True

 False

Definition
false
Term

The first phase of the security policy cycle involves a vulnerability assessment.

 

 True

 False

Definition
true
Term
Most people are taught using a(n) _____________ approach
Definition
pedagogical
Term
A(n) ____________ is a methodical examination and review that produces a detailed report of its findings.
Definition
audit
Term
___________ seeks to approach changes systematically and provide the necessary documentation of the changes.
Definition
Change management
Term

Which of the following terms describes the art of helping an adult learn?

 

andragogical

 

pedagogical

 

deontological

 

metagogical

Definition
andragogical
Term

 

A(n) _____________ is a collection of requirements specific to the system or procedure that must be met by everyone.

Definition
standard
Supporting users have an ad free experience!