• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

11. (p. 154-156) What is PKIX?

A. One of the standards used in implementing a public key infrastructure

12. (p. 156-158) What is PKCS?

A. One of the standards used in implementing a public key infrastructure

11. (p. 205) A ________ is a network typically smaller in terms of size and geographic coverage and consist of two or more connected devices. Home or office networks are typically classified as this type of network.

A. local area network

13. (p. 208) A network protocol is

A. An agreed upon format for exchanging or transmitting data between systems

21. (p. 206) All the network components are connected to a central point in which topology?

A. Star

35. (p. 219) The buffer between the outer network where there are no controls and the inner secure network is referred to as the

A. DMZ

36. (p. 221) The series of worldwide interconnected networks is referred to as the

D. Internet

12. (p. 186) A newer portable media that provides new obstacles is a(n)

B. USB drive

24. (p. 190) Man traps are a good countermeasure against

C. Tailgating

22. (p. 192) The following are examples of clean-agent fire suppression systems EXCEPT:

C. Halon

11. (p. 189) In terms of physical security, ___________ refers to protecting important assets by using several perimeters

A. layered access

28. (p. 181) What kind of copy is a drive image?

A. Bit-by-bit copy

15. (p. 168) Pretty good privacy (or PGP) is

B. A common encryption method for e-mail

28. (p. 169) HTTPS uses port

C. 443

30. (p. 155) Certificates that should no longer be used due to compromise should be

C. Revoked

22. (p. 234) You are building a network and need to connect five computers in an office. They will be on the same network segment and you should be able to perform some security functions such as port address security. What device would you use to connect the computers?

A. Switch

18. (p. 250-254) ________media store data through the rearrangement of magnetic particles on a nonmagnetic substrate

C. Magnetic

23. (p. 236-237) You are building a network and need to connect three different network segments,including the Internet. The device must enforce security policies and perform stateful packet filtering. The device you would use is a

D. Firewall

19. (p. 251-252) ________are types of magnetic media.

C. Hard drives, diskettes, tape

21. (p. 235) You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use connect them?

B. Router

16. (p. 271) Which of the following describes the wireless standard?

A. 802.11

14. (p. 261) What does AAA stand for?

D. Authentication, Authorization, Accounting

25. (p. 283) Your boss wants you to suggest a secure way to connect to the corporate network from home. You will have to connect through the Internet. What is a possible solution?

C. VPN

22. (p. 288) The primary vulnerability associated with many methods of remote access is

C. The passing of critical data in clear text

12. (p. 281) What does SSH stand for?

C. Secure Shell

12. (p. 295-296) Why is wireless problematic from a security standpoint?

C. There is no control over the physical layer of traffic.

19. (p. 311-313) With any wireless protocol, which of the following are true?

A. Extra care should be taken to ensure that the security of the protocol is not compromised.

22. (p. 304) Which of the following specifications of 802.11 has the highest speed?

B. n

26. (p. 298-299) WAP implements integrity through the use of

C. MACs

23. (p. 300) Which of the following protocols was designed for short-range wireless communication typically with mobile phones?

B. Bluetooth