CYB301-Chapter8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

What level security event is the most critical

0

2
New cards

What type of "log collector" can generate syslog messages from Cisco devices as well as UNIX or Linux servers?

syslog

3
New cards

In order to sniff network traffic, what must be enabled on the switch?


port mirroring

4
New cards

You want to identify the traffic that is generated and sent through a network by a specific application on a device.

protocol analyzer

5
New cards

What is the core function of IPAM?

To scan DHCP and DNS servers and log IP address usage to a database

6
New cards

What tool tries to identify which TCP and UDP ports are listening>


port scanner

7
New cards

Which of the following is used for defining:

  • Who is doing what

  • When they are doing it

  • Summary of the relationship

Memorandum of Understanding (MOU)

8
New cards

A __________ is a step-by-step process that outlines how to implement a specific action.

procedure

9
New cards

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before you implement that device?


change management

10
New cards

Of the following, which one is NOT one of the three network planes?


security plane

11
New cards

What term describes a systematic approach to ensuring that the desired state of an IT system is maintained throughout its lifecycle?


configuration management

12
New cards

Which of the following is NOT true regarding policies?


frequently change

13
New cards

What is the name of the computer that queries agents and gathers responses by sending messages?


manager

14
New cards

Which of the following is NOT a benefit of "Log Collectors"?


speed

15
New cards

What term describes an inconsistent rate of packet delivery?


jitter

16
New cards

A ____________ allows inspection of traffic received by a host or passing over a network link. 


protocol analyzer

17
New cards

Which of the following is a contract in which both parties agree not to share proprietary or confidential information gathered during the business relationship?


non disclosure agreement

18
New cards

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.

Which protocol will the software use to detect the problem?

SNMP

19
New cards

A ___________ is a general framework that guides an organization to achieve its goals.


policy