2 Network + Final Study Guide (Multiple Choice) Flashcards
- The ultimate goal of network security is to protect which of the following?
a. the customers who use the system
b. the organization and its employees
c. business partners who access the network
d. all of the above
d. all of the above
- What is a policy that defines the methods involved when a user logs on to the network called?
a. audit
b. security
c. authentication
d. acceptable use
c. authentication
- Which of the following should not be a concern when discerning the level of security that is required in a network?
a. how difficult it would be to enforce a password policy
b. the costs to implement a security system
c. whether the data is important enough to safeguard
d. from whom the data needs to be protected
a. how difficult it would be to enforce a password policy
- In Windows 7, what is the maximum length that a password can be?
a. 8
b. 16
c. 64
d. 128
d. 128
- Which one of the following passwords meets Windows password complexity requirement?
a. NetWoRKing
b. NetworkingIsFun
c. N3tworking1O1
d. netw@rk!ngb@s!cs
c. N3tworking1O1
- Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
a. Kerberos authentication
b. digital certificate
c. GNC privacy guard
d. preshared key
d. preshared key
- When using BitLocker to encrypt your entire disk which mode must you use if your system is not configured for TPM support?
a. transport mode
b. USB key mode
c. user authentication mode
d. encryption mode
b. USB key mode
- If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
a. network policy and access services
b. Active Directory services
c. domain name services
d. remote network services
a. network policy and access services
- Which VPN implementation needs no additional configuration to be allowed access through a firewall?
a. SSTP
b. IPSec
c. PPTP
d. L2TP
a. SSTP
- What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
a. IPSec
b. NAT
c. EFS
d. VPN
b. NAT
- What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
a. spyware
b. malware
c. virus
d. Trojan
b. malware
- What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
a. rootkit
b. Trojan
c. hoax virus
d. spyware
a. rootkit
- Which of the following is a type of malware that isn’t self-replicating and is usually installed by the user without his knowledge? Its primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
a. rootkit
b. Trojan
c. hoax virus
d. spyware
d. spyware
- The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
a. WEP
b. WAP
c. WPA
d. WPA2
d. WPA2
- Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
a. Port
b. Protocol
c. Ping
d. Finger
a. Port
- Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
a. packet storm
b. broadcast flood
c. smurf attack
d. half-open SYN attack
c. smurf attack
- Which of the following is not a true statement regarding the function of a switch?
a. It determines the path used based on the destination IP address
b. It sends broadcast frames out all connected ports
c. Each port on a switch represents a separate collision domain
d. Switches have the ability to operate in full-duplex mode
a. It determines the path used based on the destination IP address
- Which of the following combinations will you find in a switching table?
a. application/destination port number
b. IP address/exit interface
c. destination network/next Hop
d. MAC address/switch port number
d. MAC address/switch port number
- Besides a managed switch what is a high-end switch that offers features such as multicast processing and port security called?
a. intuitive
b. executive
c. smart
d. enterprise
c. smart
- Which of the following is not a function that would be found in a managed switch?
a. the ability to stop switching loops using STP
b. the ability to transfer it’s switching table with neighboring switches
c. the creation of VLANS to logically separate resources
d. to limit access to the network by enabling security on individual ports
b. the ability to transfer it’s switching table with neighboring switches
- Each interface on a router must have an IP address and what else to be able to communicate on the network?
a. network ID
b. default gateway
c. MAC address
d. serial number
c. MAC address
- When a router’s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
a. multi-homed router
b. dynamic router
c. link-state router
d. router on a stick
d. router on a stick
- What type of routing protocol are RIP and RIPv2?
a. distance-state protocol
b. link-state protocol
c. hybrid protocol
d. distance-vector protocol
d. distance-vector protocol
- The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
a. delivery
b. convergence
c. congestion
d. concurrence
b. convergence