Use the following scenario to answer the questions. An entrepreneur is starting a small business and is considering the server services needed for the startup company. The company handling the IT service is presenting options to the company.

IT Questions BankCategory: CCNA CyberOpsUse the following scenario to answer the questions. An entrepreneur is starting a small business and is considering the server services needed for the startup company. The company handling the IT service is presenting options to the company.

Use the following scenario to answer the questions. An entrepreneur is starting a small business and is considering the server services needed for the startup company. The company handling the IT service is presenting options to the company.

a) If the entrepreneur decides to go with Linux server, how are services handled differently from how Windows server services would be handled?

  • The services are managed using configuration files.
  • Services can only be managed from the Administrator account.
  • Services use only TCP port numbers because they are more secure.
  • The PowerShell environment can be used to make configuration changes.

Explanation: Linux server services are managed using configuration files that contain specific information about the service including port number, location of the hosted resources, and client authorization details.

b) The company will be using both Linux- and Windows-based hosts. Which two solutions would be used in a distributed firewall network design? (Choose two.)

  • iptables
  • SIEM
  • Snort
  • Windows Firewall
  • Wireshark

Explanation: A network design that uses distributed firewalls centrally manages security rules and pushes those rules to the Linux and Windows host machines. Windows-based hosts use the Windows Firewall, whereas the Linux-based hosts use a firewall application such as iptables or nftables. Snort is an open source network intrusion prevention software. Wireshark is a packet capture tool and Security information and event management (SIEM) provides real-time analysis of alerts and log entries generated by network appliances such as IDSs and firewalls.

c)Which protocol should be recommended to the company to monitor and manage network performance?

  • NTP
  • PAT
  • SNMP
  • SSH

Explanation: The Simple Network Management Protocol (SNMP) is an application layer protocol used to monitor and manage the network. Network devices have SNMP agents that communicate with the SNMP manager where the SNMP management software runs.

d)The IT company is recommending the use of PKI applications. In which two instances might the entrepreneur make use of PKIs? (Choose two.)

  • 802.1x authentication
  • FTP transfers
  • HTTPS web service
  • local NTP server
  • file and directory access permission

Explanation:The Public Key Infrastructure (PKI) is a third party-system referred to as a certificate authority or CA. The PKI is the framework used to securely exchange information between parties. Common PKI applications are as follows:

  • SSL/TLS certificate-based peer authentication
  • IPsec VPNs
  • HTTPS web traffic
  • network access control using 802.1x authentication
  • secure email using S/MIME
  • secure instant messaging
  • approve and authorize applications with Code signing
  • protect data with EFS
  • use two-factor authentication
  • secure USB storage devices

e)The entrepreneur is concerned about company employees having uninterrupted access to important resources and data. Which of the CIA triad components would address the concern?

  • authentication
  • availability
  • confidentiality
  • integrity

Exam with this question: CCNA Cyber Ops Chapter 10 Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments