What is a common network device used to connect networks?
Router
What is a common network device used to filter traffic?
Firewall
What connects all devices behind the firewall in a small business network?
Switch
What is a potential drawback associated with the freedom provided by wireless networking?
-Additional vulnerabilities
-Enhanced physical access control
-Limited signal range
-Reduced deployment cost
Additional vulnerabilities
What does micro-segmentation aid in protecting against?
Advanced persistent threats
Which of the following tools can be used to both identify and prevent threats? Select three options
-Anti-malware/antivirus
-Firewalls
-Intrusion Protection System (IPS)
-SIEM
Anti-malware/antivirus
Firewalls
Intrusion Protection System (IPS)
What does microsegmentation enforce in terms of business functions/units/offices/departments?
The concept of Least Privilege
What term describes a portion of the organization’s network that interfaces directly with the outside world and typically has more security controls and restrictions compared to the rest of the internal IT environment?
Demilitarized zone (DMZ)
What is a potential alternative to expensive dedicated point-to-point connections?
Gateway-to-gateway VPNs
How does a Web Application Firewall (WAF) function in a network?
It monitors all traffic from the outside for malicious behavior before passing commands to a web server
What is the primary purpose of Virtual Local Area Networks (VLANs)?
Consolidate traffic across multiple switch ports
Which of the following tools can be used to grant remote users access to the internal IT environment?
VPN (virtual private network)
What is the function of transfer switches or transformers in a redundant power system?
Enable seamless transition between power sources
In a scenario requiring full redundancy, what should devices have in terms of power supplies?
Two power supplies connected to diverse sources
Why is an abnormal system shutdown in a data center a concern?
It may result in the loss or corruption of data
What is network monitoring or sniffing?
Monitoring traffic patterns to obtain information about a network
What is the purpose of the three-way handshake in networking?
Synchronizing and acknowledging requests
What are well-known ports (0-1023) associated with?
Common protocols at the core of TCP/IP
What is resource pooling in the context of cloud computing?
Sharing physical servers with other organizations
What is a cloud arrangement in which the provider owns and manages the hardware, operating system, and applications in the cloud, while the customer retains ownership of the data?
Software as a service (SaaS)
What is one of the services offered by many MSPs, where they monitor firewalls and other security tools to provide expertise in triaging events?
Managed Detection and Response (MDR) Service
Which cloud computing model allows an enterprise to scale up new software or data-based services/solutions quickly without massive hardware installation?
Infrastructure as a Service (IaaS)
Which organization’s definition of cloud computing is commonly used globally?
National Institute of Standards and Technology (NIST)
What is the main purpose of a Service Level Agreement (SLA)?
To document specific parameters and minimum service levels