ITNT 1500 Finals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

configuration management

A method for identifying and documenting all infrastructure and devices at a site to ensure the desired state of an IT system is maintained throughout its lifecycle

2
New cards

change management

A process for approving, preparing, supporting, and managing new or updated business processes or technologies best describes what?

3
New cards

Nmap

This tool is widely used for IP scanning, both as an auditing and as a penetration testing tool. It is open-source software with packages for most versions of Windows, Linux, and macOS.

4
New cards

Monitoring system & agents

The Simple Network Management Protocol (SNMP) is a widely used framework for remote management and monitoring of servers and network appliances. What two items are associated with SNMP?

5
New cards

A fault requiring immediate remediation has occurred.

Syslog is an example of a protocol and supporting software that facilitates log collection. It has become the standard for logging events from distributed systems. If you received the following code and level in Syslog, what does it mean?

1 Alert

6
New cards

Confidentiality, Integrity, Availability

One of the foundational principles of computer security is that the systems used to store, transmit, and process data must demonstrate the three properties of the CIA Triad. What does CIA stand for?

7
New cards

a vulnerability assessment

"Evaluation of a system's security and ability to meet compliance requirements based on the configuration state of the system, as represented by information collected from the system" describes what?

8
New cards

Person in the Middle (PitM)

On-path attacks formerly were known as Man-in-the-Middle (MitM) attacks, but this is being phased out. In addition to knowing those two terms, on-path attacks have other names, too! Choose the term below that is NOT mentioned by CompTIA as one you should be familiar with:

9
New cards

False

Since IPv6 does not use ARP, it is not vulnerable to layer 2 spoofing. True or False?

10
New cards

True

MAC flooding is used to attack a switch; ARP poisoning is directed at hosts. True or False?

11
New cards

Shadow IT

Computer hardware, software, or services used on a private network without authorization from the system owner can best be described by which term?

12
New cards

Spoofing is using false DNS requests or replies or running a rogue DNS service, while poisoning is manipulating cached records

Which of the following best describes the difference between DNS spoofing and DNS poisoning?

13
New cards

Identification, Authentication, Authorization, Accounting

Modern access control is typically implemented as an identity and access management (IAM) system. IAM is comprised of four main processes. Choose the correct four below:

14
New cards

Authentication ensures customers have unique accounts and can manage their orders and billing information, while authorization ensures customers can place orders only when they have valid payment mechanisms in place

Using an e-commerce site as an example, which of the following best describes the difference between authentication and authorization? 

15
New cards

False

Requiring a PIN along with date of birth is an example of multifactor authentication. True or False?

16
New cards

Kerberos

A single sign-on (SSO) system allows the user to authenticate once to a local device and be authorized to access compatible application servers without having to enter credentials again. Which of the following is an example of a SSO system often used with Windows Active Directory?

17
New cards

802.11

What IEEE standard is WiFi based on?

18
New cards

Internet of Things (IoT)

Which term is used to describe a global network of embedded systems such as personal devices, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity. 

19
New cards

SDN

APIs and compatible hardware/virtual appliances allowing for programmable network appliances and systems best describes which Cloud Computing concept?

20
New cards

Which of the following best describes Cable Internet?

An Ethernet cable connects the cable modem to the customer's router, and a short segment of coax connects the WAN port to the provider network

21
New cards

CSMA/CA

What does WiFi use to deal with contention?

22
New cards

WiFi 1

802.11b

23
New cards

WiFi 2

802.11a

24
New cards

WiFi 3

802.11g

25
New cards

WiFi 4

802.11n

26
New cards

802.11i

This standard provides improved data encryption for 802.11 a,b,g networks

27
New cards

802.11r

This standard provides speedier handoffs between WLAN access points or cells

28
New cards

WiFi 5

802.11ac

29
New cards

WiFi 6

802.11ax

30
New cards

An industrial control system (ICS)

This provides mechanisms for workflow and process automation. It controls machinery used in critical infrastructure, such as power suppliers, water suppliers, health services, telecommunications, and national security services.

31
New cards

Which of the following best describes the difference between scalability and elasticity? 

Scalability refers to the ability to handle increased workload by adding resources, while elasticity refers to the ability to handle changes to demand in real time

32
New cards

The bandwidth in the last mile, where the copper wiring infrastructure is generally not good

Which of the following best describes the major obstacle to providing WAN access that can approach LAN performance? 

33
New cards

An IDS performs real-time analysis and raises alerts, while an IPS provides an active response to network threats

Which of the following best describes the difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)? 

34
New cards

Virtual Private Network (VPN)

Which term best describes "a secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet)"?

35
New cards

Screened subnet

This segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports is often referred to as what? (Formerly referred to as a demilitarized zone [DMZ]).

36
New cards

A wireless survey

Documentation about a location for the purposes of building an ideal wireless infrastructure; it often contains optimum locations for wireless antenna and access point placement to provide the required coverage for clients and to identify sources of interference best describes what?

37
New cards

Layer 3 (Network)

Where does the router lie in the osi model?