Professional Documents
Culture Documents
Net Sec
Net Sec
1 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
b.
Ignore Updates
c.
Reuse password
d.
Download software to any web-
site available
3 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
30. Layer that is responsible for establish- Session Layer
ing and maintaining connections.
c.
To gain a competitive advantage
d.
To take advantage of competi-
tors confidential information
38. True
4 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
In implementing network security, com-
pany should invest more in preventing
or avoiding any security breach over de-
tecting and responding to any form of
attack
42. Which of these are not part of the reason To exploit vulnerabilities in the
why we need to secure our network? system
5 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
49. It has a vital role in an information sys- Network
tem because it is the one that allows a
company to link their computers and its
users
6 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
58. It will help the company to provide a bet- Security Trinity
ter strategy in keeping a data secured
while avoiding intruders to alter or steal
important and confidential information.
61. It has been developed by ISO in the year OSI Reference Model
1984.
c.
Appearance of strange desktop
icons
d.
Slower computer performance
7 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
67. These layers work together to transmit OSI Layer
the data from one person to another
world wide.
8 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
78. Type of malware that may contain an at- Phishing
tachment to an email that loads malware
onto your computer system.
SWITCH>enable
SWITCH#config term
SWITCH(config)#interface
range f0/4-8
SWITCH(config-if-range)#shut-
down
84. It ensure that the essential and vital ser- Services running
vices are only running on the system
85. Which of the following are not part of the Uninstall Necessary Software
steps in order to harden your system.
Choose only one.
106. SCADA
11 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
It is a special system used in industrial
environments and settings to monitor
their operations
113. Which of these are not part of the two Window settings
categories of Group Policy. (Choose any
that applies) Security settings
13 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
The EAP communication oc-
curs between the supplicant and
theauthentication server.
127. What is the name of the "secure cookie" Protected access credential
used with EAP-FAST that can be used in (PAC)
lieu of a certificate, or even in addition
to a certificate?
132. Why is RADIUS or TACACS+ needed? Both RADIUS and TACACS+ ex-
Why can't the end user authenticate di- tend the Layer-2 authentication
rectly to the authentication server? protocols, allowing the end user
to communicate with an authen-
tication server that is not Layer-2
adjacent
133. What are the three main components of Authentication server, suppli-
IEEE 802.1X? cant, authenticator
135. True
14 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
True or False? A tunneled EAP type is
able to use native EAP types as its inner
method.
136. What is the purpose of an outer identity? The outer identity provides a
mechanism to authenticate the
identity of the endpoint during
the tunnel establishment phase.
138. Which of the following Cisco products Cisco Secure Access Control
should be used for device administra- Server (ACS)
tion with TACACS+?
141. When using RADIUS, what tells the AAA The Service-Type field.
server which type of action is being au-
thenticated?
143. When configuring a Cisco switch for Both at global configuration level
802.1X, at which level of the configu- as well as per interface.
ration do the 802.1X-related commands
exist?
15 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
144. When configuring a Cisco Wireless LAN The authentication and autho-
Controller (WLC) for communication rization RADIUS servers can be
with ISE, what must be configured for pointed to the same ISE PSN.
the wireless LAN (WLAN)? (Choose
two.)
146. What is the purpose of adding a user The switch can send period-
with the username radiustest password ic RADIUS Access-Requests
password command? to the AAA servers to verify
whether they are still alive. The
username and password will be
used for that test.
16 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
152. Which command will validate that show authentication session in-
authentications are being attempted, terface <interface>
which authentications are successful,
and which authorization results have
been assigned?
Logical profiles
156. Which three probes exist with device CDP, DHCP, LLDP
sensor?
157. How are updated profiles distributed to Cisco's Profiler Feed Service.
customer ISE deployments?
158. What determines when an endpoint is The certainty value must equal
assigned to a profile? or exceed the minimum certainty
value of the profile.
160. What are two ways to collect HTTP user Directly from ISE web portals
agent strings?
SPAN port mirroring
161. False
17 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
True or False? ISE deployments must
wait for Feed Service updates for new
profiles.
162. What will happen when an ISE admin- All nonconflicting profiles will be
istrator has modified a profile and then downloaded and installed. The
a Feed Service update is downloaded conflicting profiles will be ig-
that contains an updated version of that nored.
profile?
18 / 18