A correlation engine aggregates and correlates content from different sources to uncover an attack.
A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS) attacks.
An administrator needs to examine FTP commands that are being passed to a server. What port should the administrator be monitoring?
19
21
22
20
A private cloud is one in which the services and infrastructure are offered to all users with access provided remotely through the Internet.
At what level of the OSI model does the IP protocol function?
Transport Layer
Data Link Layer
Presentation Layer
Network Layer
File integrity check (FIC) is a service that can monitor any changes made to computer files, such as operating system files.
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
MAC address
subnets
VLAN
IP address
If a network administrator needs to configure a switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch, what switch technology will need to be supported?
port snooping
interface capture
port mirroring
port identity
In what type of cloud computing does the customer have some control over the operating systems, storage, and their installed applications?
Software as a Service
Application as a Service
System as a Service
Infrastructure as a Service
On and SDN network, what specific unit gives traffic the permission to flow through the network?
SDN gateway
SDN router
SDN firewall
SDN controller
Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?
malware management
application whitelist
application control
inventory permissions
Select the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
NIS
WINS
TACACS+
DNS
S/MIME can be used when mail is accessed through a web browser.
SNMP-managed devices must have an agent or a service that listens for commands and then executes them.
TCP/IP uses its own four-layer architecture that includes the Network Interface, Internet, Transport, and Application layers.
The most popular implementation of DNS is the Unix Internet Name Domain.
Trivial File Transfer Protocol (TFTP) uses a more memory when compared to FTP.
Type I hypervisors run on the host operating system.
What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply.)
management plane
control plane
data plane
all of the above
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
router
switch
bridge
hub
What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?
SSL/TLS tap
SSL/TLS access point
SSL/TLS accelerator
SSL/TLS mirror
What hardware device can be inserted into a network to allow an administrator to monitor traffic?
network tap
network mirror
shark box
shark tap
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
IPX/SPX
TCP/IP
Appletalk
UDP
What secure protocol is recommended for Network address translation?
S/MIME
IMAP
SRTP
IPsec
What secure protocol is recommended for time synchronization?
NTP
POP
What secure protocol is recommended for voice and video?
What specific issues are associated with log management? (Choose all that apply.)
The large volume of data that needs to be logged
The multiple devices generating logs
The different log formats
The fast network transfer speeds
What type of computing environment allows servers, storage, and the supporting networking infrastructure to be shared by multiple enterprises over a remote network connection that had been contracted for a specific period?
cloud services
hosted services
volume computing
virtual services
What type of switch is used to combine multiple network connections into a single link?
gateway switch
core switch
access switch
aggregation switch
What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?
centralized device log analyzer
system log manager
network log device
core device log analyzer
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
supervisor
hypervisor
hypercard
kernel
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
MIB
entity
community string
OID
Which Cloud computing service model uses the cloud computing vendor to provide access to the vendor's software applications running on a cloud infrastructure?
Sofware as a Service
Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?
Application Layer
Which of the following is the process of running a user desktop inside a virtual machine that resides on a server?
SDN
VDI
PaaS
SaaS
Which of the following protocols is unsecured?
SSL
TLS
HTTPS
FTP
Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?
SNMP
Which technology is a means of managing and presenting computer resources by function without regard to their physical layout or location?
cloud computing
IaaS
virtualization