Which high-speed storage network protocols used by a SAN is IP-based?
iSCSI
Which Fibre channel zone is the most restrictive?
FC hard zone
An attacker can use NetBIOS to determine each of the following EXCEPT
list of remote NETBIOS names
Which type of log can provide details regarding requests for specific files on a system?
access log
Which type of device log contains the most beneficial security data?
firewall log
Which type of cloud is offered to all users?
public cloud
Which of these would NOT be a valid internet control message protocol error message
router delay
which means the following are valid internet control message protocol error messages
host unreachable
network unreachable
destination network unknown
Internet control message protocol is used by each of these attacks except
ICMP poisoning
the following are used
smurf DoS attack
ICMP redirect attack
ping of death
Which version of simple network management protocol is considered the most secure?
SNMPv3
Which Damian Name System attack replaces a fraudulent IP address for symbolic name?
DNS poisoning
Which of these is the most secure protocol for transferring files?
SFTP
Each of these is a technique for securing a router except
making all configuration changes remotely
the following:
securing all ports
setting a strong administrator password
using meaningful router name.
which statement about flood guard is true
it prevents DoS or DDoS attacks
Each of these is an entry in a firewall log that should be investigated except
successful logins
the following:
ip address that are being rejected and dropped
suspicious outbound connections
IP addresses that are being rejected and dropped
If a group of users must be separated from other users which is the most secure network design?
Connect them to different switches and routers
Why is loop protection necessary?
it prevents a broadcast storm that can cripple a network
What does MAC limiting and filtering do?
it limits devices that can connect to a switch
in a network using IEEE 802.1x a supplicant
makes a request to the authenticator
Which statement is true regarding security for a computer that boots to apple mac OS x and then runs a windows virtual machine?
the windows virtual machine needs its own security
Which of the following is NOT a security concern of virtualize environments?
virtual servers are less expensive than their physical counterparts.
Which of the following is NOT a medium to connect to an FTP server?
Mapped network drive
Which of the following is a defensive measure used to specifically prevent a DDOS?
Flood Guard
Which technology can prevent DNS poisoning in a DNS namespace?
BIND
Which protocol can be used to perform a Smurf attack?
ICMP
Why will IPv6 eventually replace IPv4?
IPv4 has run out of unique addresses for all the devices on the internet