Shared Flashcard Set

Details

Rach p 9
Networking fundamentals
13
Computer Networking
Post-Graduate
06/12/2017

Additional Computer Networking Flashcards

 


 

Cards

Term

Which of the following is a technique you can use to secure a wireless network?

a. subnetting

b. MAC address filtering

c. WPA2

d. SSID broadcast

Definition
b and c
Term

Which of these protocols is used for VPNs (choose all that apply)?

a. PPTP

b. WEP

c. SSTP

d. L2TP

e. ICMP

Definition
a, c, d
Term

How do VPNs accomplish the private part of VPN?

 

Definition
tunneling
Term
Which of the following terms refers to attacking a webserver by forcing it to respond to a flood of ping packets so that the server cant respond to normal traffic?
Definition
DoS
Term
Which authentication protocol is used in a windows domain environment?
Definition
Kerberos
Term

Which of the following is a credential category?

a. knowledge

b. inherence

c. encryption

d. possession

e. authentication

Definition
a, b , d
Term

Which of the following is a method IPSec uses to authenticate the identity of communicating devices (choose all that apply)?

a. multishared key

b. Kerberos

c. PAM

d. digital certificates

Definition
b and d
Term

To encrypt data stored on a hard drive on windows server computer you should use which of the following?

a. EFS

b. AES

c. NTFS

d. PAP

Definition
a
Term

Firewalls can filter packets based on which of the following?

a. Source address

b. Protocol

c. OS

d. Context

Definition
a, b , d
Term

If network adminstrators want to be informed when an attempt has been made to compromise the network what should they use?

a. VPN

b. AES

c. IDS

d. EFS

Definition
c - intrusion detection system
Term

Which VPn mode shold you use if you want to establish a secure tunnel between a main office and a branch office?

a. client to gateway

b. site to site

c. site to gateway

d. host to site

Definition
b
Term

What's a common place to install an NIDS?

a. In the DMZ

b. On an isolated host

c. On a honey pot

d. In the ISP

Definition
a
Term

What device should you consider installing if you want countermeasures to take place when an attack is detected?

a. content filter

b. IPS

c. antivirus software

d. HIDS

Definition
b - Intrusion prevention system
Supporting users have an ad free experience!