Ocsic at Hochschule Für Telekommunikation | Flashcards & Summaries

Select your language

Suggested languages for you:
Log In Start studying!

Lernmaterialien für ocsic an der Hochschule für Telekommunikation

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen ocsic Kurs an der Hochschule für Telekommunikation zu.

TESTE DEIN WISSEN

Which command will display the interface traffic statistics for the average input rate?

Lösung anzeigen
TESTE DEIN WISSEN

show version

Lösung ausblenden
TESTE DEIN WISSEN

You are working as IT security engineer and you are browsing through the sectools.org website to see the top network security tools, as well as find more details on each particular tool and read reviews for it. What is the initiative that runs this website?

Lösung anzeigen
TESTE DEIN WISSEN

IEEE

Lösung ausblenden
TESTE DEIN WISSEN

Which option is the most scalable solution for inter-VLAN routing?

Lösung anzeigen
TESTE DEIN WISSEN

Layer 2 switch 

Lösung ausblenden
TESTE DEIN WISSEN

Match the concept with the appropriate description.

Lösung anzeigen
TESTE DEIN WISSEN

confidentiality

ensuring that only authorized parties can read a message


origin authentication  

ensuring that any messages received were actually sent from the perceived origin


non-repudiation

ensuring that the original source of a secured message cannot deny having produced the message


data integrity

ensuring that any changes to data in transit will be detected and rejected

Lösung ausblenden
TESTE DEIN WISSEN

Match the key security concept with its description.

Lösung anzeigen
TESTE DEIN WISSEN

threat

any circumstance or event with the potential to cause harm to an asset


vulnerability

weakness that compromises either the security or the functionality of a system


exploit

mechanism that is used to leverage a vulnerability to compromise the security or functionality of a system


risk

likelihood that a particular threat using a specific attack will exploit particular vulnerability


mitigation techniques

methods and corrective actions that you can take to protect against threats, specific exploits, etc.

Lösung ausblenden
TESTE DEIN WISSEN

What are three examples of remote access locations? (Choose three.)

Lösung anzeigen
TESTE DEIN WISSEN

branch offices

Lösung ausblenden
TESTE DEIN WISSEN

Match the type of attack with its description

Lösung anzeigen
TESTE DEIN WISSEN

spear phishing

emails sent to smaller, more targeted groups, even a single individual


whaling

emails sent to targeted groups of high profile individuals, such as top executives


pharming

Victims are lured by compromising name services.


watering hole

leverages a compromised web server to target select group that visits this website regularly


vishing

uses voice and the phone system as its medium


smishing

uses SMS texting as its medium

Lösung ausblenden
TESTE DEIN WISSEN

What is the function of a firewall?

Lösung anzeigen
TESTE DEIN WISSEN

automatically handle the configuration of wireless access points

Lösung ausblenden
TESTE DEIN WISSEN

You are given a physical network diagram. Which two statements about the logical diagram for the same network are true? (Choose two.)

Lösung anzeigen
TESTE DEIN WISSEN

The logical diagram is obvious from the physical diagram.

Lösung ausblenden
TESTE DEIN WISSEN

What is the availability percentage over a one year period of the network that is not available for 15 minutes each month?

Lösung anzeigen
TESTE DEIN WISSEN

99.9657 percent

Lösung ausblenden
TESTE DEIN WISSEN

Which network characteristic indicates the general expense to purchase, install, and maintain network components?

Lösung anzeigen
TESTE DEIN WISSEN

bandwidth

Lösung ausblenden
TESTE DEIN WISSEN

What is the function of a WLAN controller?

Lösung anzeigen
TESTE DEIN WISSEN

monitor and control the incoming and outgoing network traffic

Lösung ausblenden
  • 1622 Karteikarten
  • 24 Studierende
  • 0 Lernmaterialien

Beispielhafte Karteikarten für deinen ocsic Kurs an der Hochschule für Telekommunikation - von Kommilitonen auf StudySmarter erstellt!

Q:

Which command will display the interface traffic statistics for the average input rate?

A:

show version

Q:

You are working as IT security engineer and you are browsing through the sectools.org website to see the top network security tools, as well as find more details on each particular tool and read reviews for it. What is the initiative that runs this website?

A:

IEEE

Q:

Which option is the most scalable solution for inter-VLAN routing?

A:

Layer 2 switch 

Q:

Match the concept with the appropriate description.

A:

confidentiality

ensuring that only authorized parties can read a message


origin authentication  

ensuring that any messages received were actually sent from the perceived origin


non-repudiation

ensuring that the original source of a secured message cannot deny having produced the message


data integrity

ensuring that any changes to data in transit will be detected and rejected

Q:

Match the key security concept with its description.

A:

threat

any circumstance or event with the potential to cause harm to an asset


vulnerability

weakness that compromises either the security or the functionality of a system


exploit

mechanism that is used to leverage a vulnerability to compromise the security or functionality of a system


risk

likelihood that a particular threat using a specific attack will exploit particular vulnerability


mitigation techniques

methods and corrective actions that you can take to protect against threats, specific exploits, etc.

Mehr Karteikarten anzeigen
Q:

What are three examples of remote access locations? (Choose three.)

A:

branch offices

Q:

Match the type of attack with its description

A:

spear phishing

emails sent to smaller, more targeted groups, even a single individual


whaling

emails sent to targeted groups of high profile individuals, such as top executives


pharming

Victims are lured by compromising name services.


watering hole

leverages a compromised web server to target select group that visits this website regularly


vishing

uses voice and the phone system as its medium


smishing

uses SMS texting as its medium

Q:

What is the function of a firewall?

A:

automatically handle the configuration of wireless access points

Q:

You are given a physical network diagram. Which two statements about the logical diagram for the same network are true? (Choose two.)

A:

The logical diagram is obvious from the physical diagram.

Q:

What is the availability percentage over a one year period of the network that is not available for 15 minutes each month?

A:

99.9657 percent

Q:

Which network characteristic indicates the general expense to purchase, install, and maintain network components?

A:

bandwidth

Q:

What is the function of a WLAN controller?

A:

monitor and control the incoming and outgoing network traffic

ocsic

Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

Jetzt loslegen

Das sind die beliebtesten ocsic Kurse im gesamten StudySmarter Universum

OC

Universität Paderborn

Zum Kurs

Die all-in-one Lernapp für Studierende

Greife auf Millionen geteilter Lernmaterialien der StudySmarter Community zu
Kostenlos anmelden ocsic
Erstelle Karteikarten und Zusammenfassungen mit den StudySmarter Tools
Kostenlos loslegen ocsic