Filters
Question type

Study Flashcards

How does the Remote Authentication Dial-In User Service (RADIUS) function?

Correct Answer

verifed

verified

RADIUS is an open-source standard develo...

View Answer

The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.

Correct Answer

verifed

verified

Enforcing a virtual security perimeter using a client's geographic location is known by what term?


A) geohashing
B) geofencing
C) geolocating
D) geolocking

Correct Answer

verifed

verified

Which adaptation of EAP utilizes EAP


A) EAP-TLS
B) Protected EAP (PEAP)
C) EAP-FAST
D) LEAP

Correct Answer

verifed

verified

The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.

Correct Answer

verifed

verified

Which encryption standard was originally utilized with WPA's TKIP?


A) Advanced Encryption Standard (AES)
B) Rivest Cipher 4 (RC4)
C) Blowfish
D) Data Encryption Standard (DES)

Correct Answer

verifed

verified

The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.

Correct Answer

verifed

verified

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?


A) Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
B) Only one root port, which is the bridge's port that is furthest from the root bridge, can forward.
C) All ports can forward frames to the root bridge, provided they are not in a down state.
D) All ports will forward frames to the root bridge, unless a BPDU is received back on that same port.

Correct Answer

verifed

verified

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?


A) authentication
B) authorization
C) accounting
D) accessibility

Correct Answer

verifed

verified

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?


A) STP must first select the root bridge, or master bridge.
B) STP examines the possible paths between all other bridges.
C) STP disables links that are not part of a shortest path.
D) STP begins to block BPDUs on non-designated ports.

Correct Answer

verifed

verified

What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?


A) Transparent Interconnection of Lots of Links (TRILL)
B) Shortest Path Bridging (SPB)
C) Rapid Spanning Tree Protocol (RSTP)
D) Multiple Spanning Tree Protocol (MSTP)

Correct Answer

verifed

verified

User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.

Correct Answer

verifed

verified

Which protocol designed to replace STP operates at Layer 3 of the OSI model?


A) Rapid Spanning Tree Protocol (RSTP)
B) Transparent Interconnection of Lots of Links (TRILL)
C) Shortest Path Bridging (SPB)
D) Multiple Spanning Tree Protocol (MSTP)

Correct Answer

verifed

verified

What is a SIEM (Security Information and Event Management) system utilized for?


A) It is an advanced intrusion protection system with a GUI-frontend.
B) It is a system used to evaluate data from security devices and generate alerts.
C) It is an intellectual property protection software that prevents data links, and generates alerts.
D) It is a system that monitors security device hardware availability.

Correct Answer

verifed

verified

The Spanning Tree Protocol operates at the Network layer of the OSI model.

Correct Answer

verifed

verified

What is NOT a variable that an network access control list can filter traffic with?


A) The Network layer protocol used for the packet.
B) The Transport layer protocol used for the packet.
C) The source or destination TCP/UDP port number in the packet.
D) The operating system used by the source or destination device.

Correct Answer

verifed

verified

How does a reverse proxy differ from a normal proxy?

Correct Answer

verifed

verified

Whereas proxy servers access resources o...

View Answer

What statement regarding role-based access control is accurate?


A) RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.
B) RBAC allows users to decide for themselves who has access to that user's resources.
C) RBAC organizes resources into hierarchical classifications, such as "confidential" or "top secret".
D) RBAC is the most restrictive method of access control.

Correct Answer

verifed

verified

What is the purpose of Unified Threat Management (UTM)?

Correct Answer

verifed

verified

Unified Threat Management is a security ...

View Answer

What kind of firewall can block designated types of traffic based on application data contained within packets?


A) stateful firewall
B) stateless firewall
C) content-filtering firewall
D) packet-filtering firewall

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer