Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONSec 1.3, 1.4, 1.5

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Sec 1.3, 1.4, 1.5

Description:
Sec 1.3, 1.4, 1.5

Author:
BA
(Other tests from this author)

Creation Date:
04/06/2018

Category:
Others

Number of questions: 38
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
A physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
What are we talking about here: • Logically separate your switch ports into subnets • Cannot communicate to each other without a router • The router/firewall becomes the gatekeeper • Group users together by function • Is often integrated with the NAC.
Private IP address is mapped to a public IP address, where the public address is always the same IP address. Static NAT Dynamic NAT Source NAT Public NAT.
Permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal is to conserve IP addresses. PAT NAC ACL UTM.
Which of the following applies to NAC? Very useful in large, open, complex environments. Your data is out there, but more within your control The control of physical objects is gone The router/firewall becomes the gatekeeper.
Which of the following would be associated with Virtualization? Huge cost savings A complex technology One of the newest digital technologies Needs additional authentication.
Cloud: • No servers, no software, no maintenance team • No hardware of any kind • Someone else handles everything, you handle the product • You don’t have control of the data, people, or infrastructure • SalesForce.com is an example PaaS SaaS IaaS HaaS.
Cloud: • No local installation • Used for common business functions such as payroll services • Data and applications are centrally managed • Gmail and Google Docs are examples PaaS SaaS IaaS HaaS.
Cloud: • Equipment is outsourced • You are still responsible for the overall device and application management • You’re also responsible for the security • Your data is out there, but more within your control • Web hosting and email services would be an example PaaS SaaS IaaS HaaS.
Cloud Deployment Models: Private Public Hybrid Community.
How many bits is an IPv4 address?.
How many bits is an IPv6 address?.
What is the correct abbreviation for IPv6 address fe80:0000:0000:0000:5d18:0652:cffd:8f52?.
Which has block level access? NAS SAN.
Connect to a shared storage device across the network: NAS SAN.
Looks and feels like a local storage device? SAN NAS.
Internet Protocol (IP)-based storage networking standard for linking data storage facilities. It provides block-level access to storage devices by carrying commands over a TCP/IP network. Used to facilitate data transfers over intranets and to manage storage over long distances. It can be used to transmit data over local area networks (LANs), wide area networks (WANs), or the Internet and can enable location-independent data storage and retrieval.
What is the difference between iSCSI and Fibre Channel over Ethernet?.
OSI Model: Match the layer with an example Physical - Layer 1 Data Link - Layer 2 Network - Layer 3 Transport - Layer 4 Session - Layer 5 Presentation - Layer 6 Application - Layer 7.
Which authentication uses TKIP? WPA WPA-2 WEP WPA-2 Enterprise.
Which authentication replaced TKIP with CCMP? WPA2 WPA2-Enterprise WEP WPA.
What encryption does WPA2 use?.
Which authentication uses 802.1X? WEP WPA WPA2 WPA2-Enterprise.
The latest and most secure wireless:.
What is this? • Provides Authentication to a network, such as in a hotel or airport • Access table recognizes a lack of authentication • Redirects web access to a special page • Enter Username / password • Once proper authentication is provided, the web session continues.
What type of WAP antennae spreads the signal evenly?.
What type of directional antennae focuses the signal to a single point?.
Very directional and high gain. Commonly used in TV reception, ham radio and as a bridge antenna to connect a site to a wifi access point: Describes a ______ antennae.
MAC Address filtering is a very secure way to block unwanted devices. True False.
SSID can be determined, even if the broadcast is disabled, by using Wireless Network Analyzer. True False.
Temporal Key Integrity Protocol (TKIP) encryption was created as a stopgap for a problem with WEP wireless and is used in ____. WPA WPA2 WPA2-Enterprise.
What replaced TKIP encryption when WPA2 wireless was created?.
Wireless encryptions: WPA WPA2.
Wireless: We are setting up a new wireless network. We want to work around existing frequencies, plan for interference. What should we do that would allow us to do this?.
You're using wireless in a coffee shop. This is quite dangerous, as everyone can see your traffic. Some of your traffic may be encrypted using HTTPS, but this isn't a given. What 'should' you use to make sure you're secure in this case?.
WPA and WPA2 wireless: Encryption methods Authentication methods.
WPA and WPA2 wireless authentications: PSK 802.1X.
Which of the following BEST describes the weakness in WEP encryption? The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.
Report abuse Consent Terms of use