Ovido
Langue
  • Anglais
  • Espagnol
  • Français
  • Portugais
  • Allemand
  • Italienne
  • Néerlandais
  • Suédois
Texte
  • Majuscules

Utilisateur

  • Se connecter
  • Créer un compte
  • Passer à Premium
Ovido
  • Accueil
  • Se connecter
  • Créer un compte

cyber security chapter 7 flash cards

for both DNS poisoning and arp poisoning involves what?

spoofing attack.

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server.
The server has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?

IPCONFIG

Which command is used in testing and troubleshooting
DNS servers?

nslookup

You are examining the security implications of virtual machines. A condition exists where the virtual machine can potentially harm the host. Which choice describes this?

Escape

You are asked to design a VLAN using a Type 1 Hypervisor. Which technology will you use as a base?

Hardware

Considering the implications of virtual servers on a host, what poses the greatest threat to them?

Hypervisor compromise

You are planning to deploy several patches and updates to a virtual server.
Which step do you take just before implementation?

Take system snapshot.

When preparing a cloud computing security solution for your organization, you implement a "gatekeeper" to guarantee your security policies. Which choice correctly identifies this method of policy enforcement?

CASB

Which type of hypervisor does not run on an underlying operating system?

Type I

Which of the following can be used to prevent a buffer overflow attack?

DEP

Aideen sent an email to her supervisor explaining the Domain Name System
Security Extensions

(DNSSEC). Which of the following statements would Aideen have NOT included in her email?

It can prevent a DNS
transfer attack.

What is the recommended secure protocol for voice and video applications?

Secure Real-time Transport Protocol (SRTP)

Which of these is the most secure protocol for transferring files?

SFTP

Which type of device log contains the most beneficial security data?

Firewall log

Which of the following TCP/ IP protocols do not relate to security?

IP

Which of the following is
NOT a security concern of virtualized environments?

Virtual servers are less expensive than their physical counterparts

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?

successful logins

What functions of a switch does a software defined network separate?

Control plane and physical plane

Which of the following is
NOT a service model in cloud computing?

Hardware as a Service (HaaS)

Which Domain Name System
(DNS) attack replaces a fraudulent IP address for a symbolic name?

DNS poisoning

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?

Port mirroring

Which of these is NOT correct about an SSL/TLS accelerator?

It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting "on top" of SSL/TLS.

Which type of cloud is offered to specific organizations that have common concerns?

Community cloud

DNSSEC adds additional and message header information, which can be used to verify that the requested data has not been altered in transmission.

resource records

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

On-premises

Network Management
Protocol (SNMP) is considered the most secure?

SNMPv2

Which type of log can provide details regarding requests for specific files on a system?

access log

Which application stores the user's desktop inside a virtual machine that resides
on a server and is accessible from multiple locations?

VDI

Which version of Simple Network Management Protocol (SNMP) is considered the most secure?

SNMPv3

Quiz
b
prep for midterm 2 (CELLS)
s
La fuerza armada nacional bolivariana
NASK dichtheid
ingör sp prov v.10
history 7
Bill of Rights Quiz
Poderes Publicos de Venezuela
experiments
separation and purification
Pathologie
polymers
Sv prov
Latijn 10
why EESG important?
Astronomy201 - Midterm
En el restaurante
Geography Year 8
Personen en begrippen HC 2 Nieuwe tijd 1
instuderingsfrågor magtarm
Personen en begrippen HC 1 nieuwe tijd 1
CSCMP Supply Chain Foundations: Procurement Professional
Test
it management 1-6 rest (midterm)
Chapter 6/9
Prefix
birthstones
Snabba Cash2
english test
Weimar germany
History n stuff
Duits allen woorden
organic chemistry
respitory system
NKSE misären
Mn153 20' January
chemistry of environment
week 6 spanish vocab
So religion jämförande test
Latin
sharps and flats
triads
Vocabulary
scientific notation
Fench quiz 1
structures and forces - copy
vin
Pharmaco
structures and forces