1/36
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
configuration management
A method for identifying and documenting all infrastructure and devices at a site to ensure the desired state of an IT system is maintained throughout its lifecycle
change management
A process for approving, preparing, supporting, and managing new or updated business processes or technologies best describes what?
Nmap
This tool is widely used for IP scanning, both as an auditing and as a penetration testing tool. It is open-source software with packages for most versions of Windows, Linux, and macOS.
Monitoring system & agents
The Simple Network Management Protocol (SNMP) is a widely used framework for remote management and monitoring of servers and network appliances. What two items are associated with SNMP?
A fault requiring immediate remediation has occurred.
Syslog is an example of a protocol and supporting software that facilitates log collection. It has become the standard for logging events from distributed systems. If you received the following code and level in Syslog, what does it mean?
1 Alert
Confidentiality, Integrity, Availability
One of the foundational principles of computer security is that the systems used to store, transmit, and process data must demonstrate the three properties of the CIA Triad. What does CIA stand for?
a vulnerability assessment
"Evaluation of a system's security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system" describes what?
Person in the Middle (PitM)
On-path attacks formerly were known as Man-in-the-Middle (MitM) attacks, but this is being phased out. In addition to knowing those two terms, on-path attacks have other names, too! Choose the term below that is NOT mentioned by CompTIA as one you should be familiar with:
False
Since IPv6 does not use ARP, it is not vulnerable to layer 2 spoofing. True or False?
True
MAC flooding is used to attack a switch; ARP poisoning is directed at hosts. True or False?
Shadow IT
Computer hardware, software, or services used on a private network without authorization from the system owner can best be described by which term?
Spoofing is using false DNS requests or replies or running a rogue DNS service, while poisoning is manipulating cached records
Which of the following best describes the difference between DNS spoofing and DNS poisoning?
Identification, Authentication, Authorization, Accounting
Modern access control is typically implemented as an identity and access management (IAM) system. IAM is comprised of four main processes. Choose the correct four below:
Authentication ensures customers have unique accounts and can manage their orders and billing information, while authorization ensures customers can place orders only when they have valid payment mechanisms in place
Using an e-commerce site as an example, which of the following best describes the difference between authentication and authorization?
False
Requiring a PIN along with date of birth is an example of multifactor authentication. True or False?
Kerberos
A single sign-on (SSO) system allows the user to authenticate once to a local device and be authorized to access compatible application servers without having to enter credentials again. Which of the following is an example of a SSO system often used with Windows Active Directory?
802.11
What IEEE standard is WiFi based on?
Internet of Things (IoT)
Which term is used to describe a global network of embedded systems such as personal devices, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity.
SDN
APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems best describes which Cloud Computing concept?
Which of the following best describes Cable Internet?
An Ethernet cable connects the cable modem to the customer's router, and a short segment of coax connects the WAN port to the provider network
CSMA/CA
What does WiFi use to deal with contention?
WiFi 1
802.11b
WiFi 2
802.11a
WiFi 3
802.11g
WiFi 4
802.11n
802.11i
This standard provides improved data encryption for 802.11 a,b,g networks
802.11r
This standard provides speedier handoffs between WLAN access points or cells
WiFi 5
802.11ac
WiFi 6
802.11ax
An industrial control system (ICS)
This provides mechanisms for workflow and process automation. It controls machinery used in critical infrastructure, such as power suppliers, water suppliers, health services, telecommunications, and national security services.
Which of the following best describes the difference between scalability and elasticity?
Scalability refers to the ability to handle increased workload by adding resources, while elasticity refers to the ability to handle changes to demand in real time
The bandwidth in the last mile, where the copper wiring infrastructure is generally not good
Which of the following best describes the major obstacle to providing WAN access that can approach LAN performance?
An IDS performs real-time analysis and raises alerts, while an IPS provides an active response to network threats
Which of the following best describes the difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
Virtual Private Network (VPN)
Which term best describes "a secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet)"?
Screened subnet
This segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports is often referred to as what? (Formerly referred to as a demilitarized zone [DMZ]).
A wireless survey
Documentation about a location for the purposes of building an ideal wireless infrastructure; it often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and to identify sources of interference best describes what?
Layer 3 (Network)
Where does the router lie in the osi model?