When using a host based intrusion detection system what additional feature might be available to alert the system of any changes made to files that should not change?

Show

Which of the following is an example of proxy server software?

Squid

What is NOT a variable that an network access control list can filter traffic with?

The operating system used by the source or destination device.

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

255.255.255.255

What kind of firewall can block designated types of traffic based on application data contained within packets?

content-filtering firewall

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

iptables

What is a SIEM (Security Information and Event Management) system utilized for?

It is a system used to evaluate data from security devices and generate alerts.

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

STP must first select the root bridge, or master bridge.

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

BPDU guard

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

Shortest Path Bridging (SPB)

You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

mac-limit

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

geofencing

When using Kerberos, what is the purpose of a ticket?

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

Which legacy authentication protocol requires mutual authentication?

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

RADIUS

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

Protected EAP (PEAP)

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

802.11i

Rapid Spanning Tree Protocol (RSTP)

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the switchport port-security command to enable MAC filtering.

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

authorization

What statement regarding role-based access control is accurate?

RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.

Which encryption standard was originally utilized with WPA's TKIP?

Rivest Cipher 4 (RC4)

The Wired Equivalent Privacy standard had what significant disadvantage?

It used a shared encryption key for all clients, and the key might never change.

In Open System Authentication, how does authentication occur?

The client "authenticates" using only the SSID name. In other words, no real authentication occurs.

The Group Policy utility can be opened by typing what name into a Run box?

gpedit.msc

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

Only one root port, which is the bridge's port that is closest to the root bridge, can forward.

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?

port mirroring

In regards to the use of local authentication, what statement is accurate?

Local authentication is network and server failure tolerant.

What scenario might be ideal for the use of root guard in configuring a switch?

You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?

file integrity monitoring (FIM)

What statement correctly describes a stateless firewall?

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.

What kind of firewall can block designated types of traffic based on application data contained within packets?

A stateless firewall blocks designated types of traffic based on application data contained within packets.

What one of the following is not a variable that a network access control list can filter traffic with?

10. What is NOT a variable that an network access control list can filter traffic with? The operating system used by the source or destination device.

What is a SIEM security information and event management system utilized for quizlet?

What is a SIEM (Security Information and Event Management) system utilized for? It is a system used to evaluate data from security devices and generate alerts.

What should be enabled to block BPDUs?

d. STP begins to block BPDUs on non-designated ports. STP must first select the root bridge, or master bridge.