quizzes part 1

The flashcards below were created by user slmckissack on FreezingBlue Flashcards.

  1. What technology creates a simulated version of a computing environment?
    A. Telephony
    B. Cloud computing
    C. Virtualization
    D. EAPoL
    C. Virtualization
    (this multiple choice question has been scrambled)
  2. What TCP/IP service replaces a packet's private IP address with a public IP address before forwarding the packet onto the public network?
    A. NAT (network address translation)
    B. NAC (network access control)
    C. PaaS (platform as a service)
    D. RAS (remote access server)
    NAT (Network Address Translation)
  3. What is the military-sounding name for a special-purpose subnet that services public access requests and receives unauthorized or unidentified traffic?
    A. Port security
    B. DMZ (demilitarized zone)
    C. NAC (network access control).
    D. War Dialing.
    B. DMZ (demilitarized zone)
    (this multiple choice question has been scrambled)
  4. What IEEE standard defines interface port-based access control and authentication services?
    IEEE 802.1x
  5. Devices like firewalls, proxy servers, and routers control, manage, and monitor networking events using what form of management?
    A. Loop management
    B. Business rules and policies management
    C. Access control management
    D. Rule-based management
    D. Rule-based management
    (this multiple choice question has been scrambled)
  6. Are cloud computing and virtualization just different names for essentially the same service?
    No, Cloud computing includes a variety of service levels that are provided on a remote server (which could be virtualized) and accessed completely over the internet. Virtualization typically occurs within the same network, with a virtualization server providing a complete processing environment to a virtualization client on a host. Cloud computing is application or service-based, and virtualization is generally hardware- and operating system-based.
  7. is a virtualization of a computing platform, although across the internet. Typically, it includes storage and networking services.  In place of purchasing the equipment and services required. Customers buy and pay for only the resources they need and consume.
    Infrastructure as a Service (IaaS) -pronounced "ice"Examples of IaaS include Amazon Web Services' Elastic Compute Cloud (EC2) and any service that hosts a subscriber's website, performs caching services, or charges customers only for services they need at any given time, such as usage and billing sites (elastic clouds).
  8. Provides on-demand software that resides centrally or through a service provider. Is rapidly growing method for many business-related applications, such as collaboration, enterprise resource planning (ERP), content management (CM), and service desk management software. Users access an application with a Web browser and without the requirement of resources for the application of their local computer.
    SaaS (Software as a Service)-pronounced "sace".Examples of Saas include any of the hosted email servers, including those from Google, Microsoft, Yahoo, and more: SurveyMonkey.com; and Ancestry.com
  9. Delivers a computing platform and solution stack as a billable service. The solution stack could include a Web server, middleware, database system, a programming language, and certain application software.
    Platform as a Service (PaaS) - pronounced "pace".PaaS allows a developer or an application service provided (ASP) to develop or deliver a service without having to purchase and manage the hardware and system necessary. Examples of PaaS include Google's App Engine and Microsoft's Azure, which enable subscribers to create custom applications.
  10. What are the three primary cloud services?
    -Platform as a Service (PaaS)-Software as a Service (SaaS)-Infrastructure as a Service (IaaS)
  11. What are the three primary forms of computing virtualization?
    -Hardware (platform) virtualization-Operating System Virtualization-Application (desktop) virtualization
  12. which is now mostly accomplished through LAN/WAN connections, was at one time limited to the use of dial-up modems and a remote access server (RAS). Dial-up modems, when they are used, can present network intrusion problems, but if the appropriate security measures are running on the RAS, the potential for security issues is lower.
    Remote Access Server (RAS)
  13. Because of the proliferation of the Internet, unique IPv4 addresses that are set aside strictly for this purpose. While private IP addresses are great for internal networks (those behind a router or firewall), they don't work on the internet. The solution is the use of ______________________?
    Network Address Translation (NAT)
  14. Is an network security zone that provides for access to internal network resources to outside users, who are typically communicating over the internet.
    • Extranet
    • In effect, an extranet is an extension of an organization's intranet accessible to trusted outside users, like vendors, suppliers, customers, and so on. In many ways, an extranet is like another DMZ.
  15. is a secure network type that is available only to authorized users within an organization. It may host several internal websites (portals) or reporting vehicles for users on the internal network and those users accessing the network via a VPN.
  16. Which of the following is not a type of stateful inspection?
    Packet FilterApplication
    level gateway
    Packet routing
    Circuit level gateway
    Packet routing
  17. What are the two main methods we can use to monitor the security of a network?
    Intrusion detection and intrusion prevention.
  18. What security process confirms a user's identity?
  19. What is the focus of computer and network security?
    Preserving confidentiality, integrity, and availability.
  20. What security mechanism sits on the network boundary and blocks network attacks and attempts to repair any damage they do?
    Intrusion Prevention System (IPS)
  21. What authentication protocol does the IEEE 802.1x security standard define?
    A. EAP
    B. SNMP
    C. AES
    D. TKP
    A. EAP
    (this multiple choice question has been scrambled)
  22. What secure wireless networking protocol replaced WEP?
    A. WPA
    B. WAP
    C. WEP2
    D. WPA2
    A. WPA
    (this multiple choice question has been scrambled)
  23. Which two well-known ports support FTP?
    A. Ports 21 and 22
    B. Ports 22 and 23
    C. Ports 80 and 443
    D. Ports 20 and 21
    D. Ports 20 and 21
    (this multiple choice question has been scrambled)
  24. Which version of SNMP implements encryption to prevent packet sniffing?
    A. SNMPv2c
    B. SNMPv1
    C. All SNMP version include encryptions
    D. SNMPv3
    A. SNMPv3
    (this multiple choice question has been scrambled)
  25. Which of the active versions of IP requires the use of IPSec?
    B. IPv5
    C. IPv4
    D. IPv2
    A. IPv6
    (this multiple choice question has been scrambled)
  26. Provides security to point-to-point (PTP) communications. It is one of the authentication methods that implement the 802.1x security standards.
    Extensible Authentication Protocol (EAP)
  27. satisfies the high-level requirements of the Federal Information Processing Standard (FIPS) that U.S. government agencies follow. The AES encryption algorithm is a symmetric block cipher that's capable of processing 128-, 192-, and 256-bit keys to encrypt data blocks up to 128 bits in length.
    Advanced Encryption Standard (AES)
  28. Is an enhancement of SSL. It uses the same three layers of packet encryption as SSL.
    Transport Layer Security (TLS)
  29. is a core TCP/IP protocol that carries error and informational messages between network devices.
    Internet Control Message Protocol (ICMP)
Card Set:
quizzes part 1
2015-02-22 20:41:38
quizzes part
quizzes part 1
quizzes part 1
Show Answers: