IST220 Study Guide Lectures 16-25 PDF
Document Details
Uploaded by Deleted User
Penn State
Tags
Summary
These are study guide notes for IST220, covering topics related to computer networks and security. The notes include questions and answers, likely from a jeopard quiz.
Full Transcript
Jeopardy On a computer network, ACLs are used to prohibit or allow certain types of traffic to the network and commonly filter traffic based on its source and destination. a. True b. False Slide: 1 Jeopardy Those devices can be endpoint devices that a...
Jeopardy On a computer network, ACLs are used to prohibit or allow certain types of traffic to the network and commonly filter traffic based on its source and destination. a. True b. False Slide: 1 Jeopardy Those devices can be endpoint devices that act as network gateways or network devices that users access directly. a. True b. False... can be network devices that act as network gateways or endpoint devices... Slide: 2 Jeopardy ACLs are used for controlling permissions to a computer system or computer network. a. True b. False Slide: 3 Jeopardy ACLs can be used to improve network security by placing malicious traffic in a containment area. a. True b. False... by keeping out malicious traffic. Slide: 4 Jeopardy ACE, in the context of our lectures, is the acronym for... a. Access Control Exception b. Access Control Error c. Access Control Entry d. Access Control Exclusion Slide: 5 Jeopardy There are two basic types of ACLs - File System ACLs and Operating System ACLs. a. True b. False... File System ACLs and Networking ACLs. Slide: 6 Jeopardy ACLs can be categorized by the way they identify traffic – as Standard ACLs or as Expanded ACLs. a. True b. False... as Standard ACLs or as Extended ACLs. Slide: 7 Jeopardy ACLs ensure that only approved users and traffic have access to a system. a. True b. False Slide: 8 Jeopardy DMZ, in the context of our lectures, is the acronym for... a. Data Maintenance Zone b. Demilitarized Zone c. Data Management Zone d. Decentralized Management Zone Slide: 9 Jeopardy A DMZ is a buffer zone with an inward-facing router that provides general security from all external networks. a. True b. False... with an outward-facing router... Slide: 10 Jeopardy A switch is a network device that is used to connect two or more LANs. a. True b. False A router is a network device... Slide: 11 Jeopardy Hubs and switches are devices that connect other devices together into a network and routers connect networks together. a. True b. False Slide: 12 Jeopardy The most common devices that make up networks are workstations, servers, and hosts. a. True b. False Slide: 13 Jeopardy CPU, in the context of our lectures, is the acronym for... a. Central Processing Unit b. Control Processing Unit c. Command Processing Unit d. Core Processing Unit Slide: 14 Jeopardy A client machine is any device on the network that can ask for access to resources like a printer or other hosts from a server or powerful workstation. a. True b. False Slide: 15 Jeopardy The term host is used to describe pretty much anything that takes an IP address. a. True b. False Slide: 16 Jeopardy An intranet is a public network that can only be accessed by authorized users. a. True b. False An intranet is a private network... Slide: 17 Jeopardy 2FA, in the context of our lectures, is the acronym for... a. Two-Factor Authentication b. Two-Factor Attribution c. Two-Factor Access d. Two-Factor Addressing Slide: 18 Jeopardy SMS, in the context of our lectures, is the acronym for... a. Storage Management Service b. Secure Management System c. Systems Management Service d. Short Message Service Slide: 19 Jeopardy SIM, in the context of our lectures, is the acronym for... a. Security Identity Module b. Service Information Message c. Subscriber Identity Module d. Security Identity Management Slide: 20 Jeopardy A Zero Trust Model is a security framework that fortifies the enterprise by removing implicit trust and enforcing strict user and device authentication throughout the network. a. True b. False Slide: 21 Jeopardy The main tenet of Zero Trust security is that vulnerabilities often appear when companies are too trusting of individuals or devices. a. True b. False Slide: 22 Jeopardy The Zero Trust Model suggests that no user, even if allowed onto the network, should be trusted by default because they could be compromised. a. True b. False Slide: 23 Jeopardy A Zero Trust Model supports macrosegmentation - a fundamental principle of cybersecurity. a. True b. False … supports microsegmentation - a fundamental... Slide: 24 Jeopardy ZTNA, in the context of our lectures, is the acronym for... a. Zero Trust Network Appliance b. Zero Trust Network Adaptor c. Zero Trust Network Architecture d. Zero Trust Network Access Slide: 25 Jeopardy SDP, in the context of our lectures, is the acronym for... a. Session Defined Perimeter b. Software Defined Perimeter c. Semi-Defined Perimeter d. Service Defined Perimeter Slide: 26 Jeopardy The two ZTNA architectures are Endpoint-Initiated and Software-Initiated. a. True b. False … and Service-Initiated. Slide: 27 Jeopardy AI, in the context of our lectures, is the acronym for... a. Artificial Intelligence b. Analog Input c. Action Item d. Area of Interest Slide: 28 Jeopardy NFT, in the context of our lectures, is the acronym for... a. Non-Functional Testing b. Network Fiber Technology c. Network Fault Tolerance d. Non-Fungible Token Slide: 29 Jeopardy An intranet is a public network that can only be accessed by authorized users. a. True b. False An intranet is a private network... Slide: 30 Jeopardy BYOD, in the context of our lectures, is the acronym for... a. Bring Your Own Docs b. Bring Your Own Device c. Bring Your Own Disk d. Bring Your Own Data Slide: 31 Jeopardy NOS, in the context of our lectures, is the acronym for... a. Netware Operating System b. Network On Standby c. Network Optimization System d. Network Operating System Slide: 32 Jeopardy TCP/IP, in the context of our lectures, is the acronym for... a. Transportation Control Protocol/Intelligent Protocol b. Transfer Control Protocol/Intranet Protocol c. Terminal Control Protocol/Internet Protocol d. Transmission Control Protocol/Internet Protocol Slide: 33 Jeopardy For the Network+ exam, stick to the definition of hosts being network devices, including workstations and servers, with IP addresses. a. True b. False Slide: 34 Jeopardy WANs are usually faster than LANs. a. True b. False … usually slower than LANs. Slide: 35 Jeopardy WANs can utilize either private or public data transport media such as phone lines. a. True b. False Slide: 36 Jeopardy In an internetwork, hosts use Internet Protocol Addresses (IP Address) to communicate with other hosts on the LAN. a. True b. False … use Hardware Addresses (MAC address) to... Slide: 37 Jeopardy In an internetwork, hosts use Logical Addresses (IP addresses) to communicate with hosts on a different LAN – on other side of the router. a. True b. False Slide: 38 Jeopardy MPLS, in the context of our lectures, is the acronym for... a. Multi-Protocol Label Switching b. Master Protocol Label Switching c. Maximum Protocol Label Switching d. Minimum Protocol Label Switching Slide: 39 Jeopardy MPLS is a switching mechanism that assigns labels (numbers) to data. It then uses those labels to forward data when it arrives at the MPLS network. a. True b. False Slide: 40 Jeopardy Forwarding inside the MPLS network (cloud) is done solely based on labels through virtual links instead of physical links. a. True b. False Slide: 41 Jeopardy Computers connected together in a client-server network don’t have any central, or special, authority. a. True b. False Computers connected together in a peer-to-peer network... Slide: 42 Jeopardy If your network is running Windows, Mac, or Unix/Linux in a local LAN workgroup, you have a peer-to-peer network. a. True b. False Slide: 43 Jeopardy In a client-server network, a single server uses a NOS for managing the whole network. a. True b. False Slide: 44 Jeopardy The physical topology of a network defines the specific characteristics of a network, such as where all the workstations and other devices are located and the precise arrangement of all the physical media such as cables. a. True b. False Slide: 45 Jeopardy The logical topology details exactly how data moves through the network. a. True b. False Slide: 46 Jeopardy A bus topology consists of two distinct and terminated ends with each of its computers connecting to one unbroken cable running its entire length. a. True b. False Slide: 47 Jeopardy SDP, in the context of our lectures, is the acronym for... a. Software-Defined Protocol b. Socket Directed Perimeter c. Software-Defined Perimeter d. Session Description Protocol Slide: 48 Jeopardy The goal of the SDP approach is to base the network perimeter on hardware instead of software. a. True b. False … to base the network perimeter on software instead of hardware. Slide: 49 Jeopardy An SDP forms a physical boundary around company assets at the network layer, not the application layer. a. True b. False An SDP forms a virtual boundary around…. Slide: 50 Jeopardy SDP authenticates devices as well as user identities. a. True b. False Slide: 51 Jeopardy Once the user and device are authenticated, the SDP sets up an individual network connection between that device and the server it is trying to access. a. True b. False Slide: 52 Jeopardy In an SDP, an authenticated user is not logged in to a larger network, but rather is given their own network connection that no one else can access and that only includes the services that the user has approved access to. a. True b. False Slide: 53 Jeopardy OSS, in the context of our lectures, is the acronym for... a. Open-Source Software b. Operating System Software c. Operational Support System d. Open-Source Solutions Slide: 54 Jeopardy Traditionally, most of the software used for commercial purposes is Proprietary (Closed- Source) Software. a. True b. False Slide: 55 Jeopardy With Proprietary Software, average users can access the code and make changes to it. a. True b. False … average users can access the code and make changes to it. Slide: 56 Jeopardy With OSS, the source code is usually made available in the form of a free download through the software's official website, or through platforms like GitHub. a. True b. False Slide: 57 Jeopardy OSI, in the context of our lectures, is the acronym for... a. Open System Interface b. Organization for Standards Institute c. Open Systems Integration d. Open-Source Initiative Slide: 58 Jeopardy GNU, in the context of our lectures, is the acronym for... a. Great New UNIX b. GNU’s Not Usable c. GNU’s Not UNIX d. Gateway Name Utility Slide: 59 Jeopardy Richard Stallman, an MIT student who strongly advocated for Open-Source development, launched Linux in 1983. a. True b. False … launched GNU in 1983. Slide: 60 Jeopardy FSF, in the context of our lectures, is the acronym for... a. Free Standards Foundation b. Free Software Foundation c. Free, Simple, and Fast d. File System Forward Slide: 61 Jeopardy GPL, in the context of our lectures, is the acronym for... a. Global Public License b. General Purpose License c. Graphical Programming Language d. General Public License Slide: 62 Jeopardy LDAP is considered lightweight because it isn’t as robust as other protocols. a. True b. False … uses a smaller amount of code than other protocols. Slide: 63 Jeopardy In the context of LDAP, a directory tells the user where in the network something is located. a. True b. False Slide: 64 Jeopardy LDAP allows a user to search for an individual without knowing where they're located, although additional information will help with the search. a. True b. False Slide: 65 Jeopardy The most common use of LDAP is to provide a central place for authentication, meaning it stores usernames and passwords. a. True b. False Slide: 66 Jeopardy An LDAP directory is hosted on a single server. a. True b. False … can be distributed among many servers. Slide: 67 Jeopardy An LDAP configuration is organized in a simple "tree" hierarchy consisting of each of the following levels, EXCEPT... a. The root directory b. Countries c. Organizations d. Teams e. Organizational Units f. Individuals Slide: 68 Jeopardy DSA, in the context of our lectures, is the acronym for... a. Directory System Agent b. Digital Signature Algorithm c. Distributed Systems Architecture d. Debian Security Advisory Slide: 69 Jeopardy Active Directory is a directory service for managing domains and distributed resources such as networks for Windows operating systems. a. True b. False …, users and distributed resources such as objects for Windows operating systems. Slide: 70 Jeopardy A directory service manages domains and objects while controlling which users have access to each resource. a. True b. False Slide: 71 Jeopardy Services included in Active Directory are Domain, Lightweight Directory, Certificate, Federation and Rights Management services. a. True b. False Slide: 72 Jeopardy Active Directory treats each user account as an object and each user object also has multiple attributes. a. True b. False Slide: 73 Jeopardy RADIUS is the acronym for Remote Access Dial-In User Service. a. True b. False … for Remote Authentication Dial-In User Service. Slide: 74 Jeopardy NAS, in the context of our lectures, is the acronym for... a. Network Authentication Service b. Network Access Service c. Network Authentication Server d. Network Access Server Slide: 75 Jeopardy The RADIUS protocol is considered a connectionless service. a. True b. False Slide: 76 Jeopardy RFC, in the context of our lectures, is the acronym for... a. Request for Comments b. Request for Change c. Request for Consideration d. Remote Feature Control Slide: 77 Jeopardy Issues related to server availability, retransmission, and timeouts are handled by the transmission protocol rather than the RADIUS-enabled devices. a. True b. False … are handled by the RADIUS-enabled devices rather than the transmission protocol. Slide: 78 Jeopardy The client passes user information to designated RADIUS servers and acts on the returned response. a. True b. False Slide: 79 Jeopardy RADIUS servers receive user connection requests, authenticate the user, and then return the configuration information necessary for the client to deliver service to the user. a. True b. False Slide: 80 Jeopardy A RADIUS server cannot act as a proxy client to other RADIUS servers or other kinds of authentication servers. a. True b. False … can act as a proxy client to other RADIUS servers... Slide: 81 Jeopardy PPP, in the context of our lectures, is the acronym for... a. Public-Private Protocol b. Point-to-Point Protocol c. Private-Public Protocol d. Private Program Protocol Slide: 82 Jeopardy PAP, in the context of our lectures, is the acronym for... a. Protected Access Protocol b. Pre-Access Protocol c. Password Authentication Protocol d. Password Access Protocol Slide: 83 Jeopardy CHAP, in the context of our lectures, is the acronym for... a. Challenge Handshake Authentication Protocol b. Community Handshake Authentication Protocol c. Challenge Handshake Access Protocol d. Comprehensive Handshake Access Protocol Slide: 84 Jeopardy When it is provided with the username and original password given by the user, RADIUS can support PPP, PAP or CHAP, UNIX login, and other authentication mechanisms. a. True b. False Slide: 85 Jeopardy Typically, a user login consists of a query (Access- Request) from the NAS to the RADIUS server and a corresponding response (Access-Accept or Access- Reject) from the server. a. True b. False Slide: 86 Jeopardy In RADIUS, authentication and authorization are coupled together. a. True b. False Slide: 87 Jeopardy Transactions between the client and RADIUS server are authenticated through the use of a shared secret, which is sent over the network. a. True b. False … are authenticated through the use of a shared secret, which is never sent over the network. Slide: 88