Review 1.4

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a properly formed Internet Protocol version 4 (IPv4) address? 2001:0db8:85a3:0000:0000:8a2e:0370:7334 255.255.255.123 192.168.256.25 165.123.40.10

165.123.40.10

Microsoft's Terminal Services uses the Remote Desktop Protocol (RDP), which is the standard protocol for connecting to Window servers. What is the Transmission Control Protocol (TCP) port number that you need to open in the firewall to use Windows Terminal Services? 3389 1433 3306 1521

3389

If you're searching for violations to security rules on your network and you see port 21 open on a group of servers, which protocol is in violation? Sendmail File Transfer Protocol (FTP) Secure Shell (SSH) Telnet

FTP

If you have customers who insist on using File Transfer Protocol (FTP) for uploading files to your server, you in turn insist that they use which protocol to ensure greater security? Trivial File Transfer Protocol (TFTP) File Transfer Protocol Secure (FTPS) Simple File Transfer Protocol (SFTP) Interactive File Transfer Protocol (IFTP)

File Transfer Protocol Secure (FTPS)

Which layer of the Open Systems Interconnection (OSI) model do network administrators generally ignore because there aren't a large number of publicized hack attacks on it? Layer 4 Layer 1 Layer 2 Layer 3

Layer 2, the Data Link layer, is the ignored layer in security. Switches, for example, are rarely hardened, updated, and configured for secure operation. Incorrectly configured virtual local area networks (VLANs) are a good example. Layer 1, the Physical layer, defines connections between devices and physical transmission media. Layer 3, the Network layer, provides the protocols for transferring data from one node to another in a system with multiple nodes with unique addresses (a network). Layer 4, Transport layer, controls the reliability of data transmission between nodes on a network for the benefit of the higher layers.

Which storage type's data transfer is the most secure? Local disk Internet Small Computer System Interface (iSCSI) Fibre Channel Fibre Channel over Ethernet (FCoE)

None of the network storage transfers are secure in that they have no native encryption during transmission. Local storage is far more secure because it only travels across the local bus architecture in the computer and never traverses the network. In other words, since the local disk does not transfer data over the network at all, it is most secure. It isn't a transfer method.

Which is the secure method of copying files from one Linux host to another Linux host? Remote Copy Protocol (RCP) File Transfer Protocol (FTP) Secure Copy (SCP) XCOPY

Secure Copy (SCP)

Which of the following protocols is not secure, but is prevalent on local networks for use in system network booting? File Transfer Protocol (FTP) Fibre Channel over Ethernet (FCoE) Trivial File Transfer Protocol (TFTP) Secure File Transfer Protocol (SFTP)

TFTP is a very limited protocol used primarily as an automated process of configuring boot files between machines. Because it offers almost no security, this protocol is used primarily on local networks instead of on the Internet.

Identify the advantage of Internet Small Computer System Interface (iSCSI) over Fibre Channel data transmission. iSCSI uses existing infrastructure. iSCSI data transmission is far more secure. iSCSI provides greater performance and reliability. iSCSI isn't susceptible to wire-tapping.

The advantage that iSCSI has over Fibre Channel is that iSCSI uses the existing infrastructure, meaning that it requires no additional equipment for implementation. Fibre Channel has greater performance and is more reliable than iSCSI; however, it is far more expensive to set up and maintain. Both iSCSI and Fibre Channel are susceptible to wiretapping and neither technology is secure. iSCSI uses existing infrastructure.

Which of the following is NOT a properly formed Internet Protocol version 6 (IPv6) address? 2001:0cc8:85a3:0000:0000:8a2e:0370:7334 2001:0db8:85a3:0000:0000:812b:0370:7334 2001:0dg8:85a3:0000:0000:8a2e:0370:7334 2001:0db8:85a3:0000:0000:8a2e:0370:7334

The incorrectly configured IPv6 address is: 2001:0dg8:85a3:0000:0000:8a2e:0370:7334. IPv6 uses hexadecimal alphanumerics to create the address, which are in the range of 0-9 and a-f. The address above contains a "g" in the second group.

What is one of the main responsibilities of Hypertext Transfer Protocol (HTTP)? To collect information from network devices for diagnostic and maintenance purposes To protect sensitive communication from eavesdropping and tampering by using a secure, encrypted, and authenticated channel over a TCP/IP connection To enable clients to connect to and interact with websites, including transferring data on web pages between systems To support web commerce by providing a secure connection between a web browser and a serve

To enable clients to connect to and interact with websites, including transferring data on web pages between systems

Though Fibre Channel protocol often affords greater performance and reliability, what is the benefit of using Fibre Channel over Ethernet (FCoE) over Fibre Channel? Fibre Channel over Ethernet (FCoE) has much easier methods for introducing security controls, like encryption and authentication. Fibre Channel over Ethernet (FCoE) isn't confined to the traditional Fibre Channel protocols. Fibre Channel over Ethernet (FCoE) has lower infrastructure cost and hardware requirements. Fibre Channel over Ethernet (FCoE) is not subject to the same security pitfalls as traditional Fibre Channel.

Fibre Channel over Ethernet (FCoE) has lower infrastructure cost and hardware requirements.

You have a requirement to transfer financially sensitive data between two of your branch accounting departments. How will you secure the data transfer? Transport Layer Security (TLS) File Transfer Protocol (FTP) Session Control Protocol (SCP) Internet Protocol Security (IPSec

For an extremely secure transfer, IPSec is the answer. It is the most secure method of transfer because of the Network layer connectivity. TLS and SCP are secured but can also be eavesdropped on and disrupted via man-in-the-middle and other attacks. FTP is a non-secure (clear text) transfer method.

What is Sendmail? A mail transfer protocol A specially-built mail server by email service providers An old, well-known, open-sourced email application An email filtering program

An old, well-known, open-sourced email application

You're in a training session with users from every department in your company. You advise them to always use Hypertext Transfer Protocol Secure (HTTPS) for web-based transactions, especially for making online purchases. Why did you make such a statement? Because it prevents web-based malware from infecting their computers. Because HTTPS is the standard for all non-corporate web browsing. Because standard Hypertext Transfer Protocol (HTTP) is a slow and deprecated protocol. Because HTTPS is secure for all data transmissions.

Because HTTPS is secure for all data transmissions.

You need to configure your firewall to accommodate your Domain Name System (DNS) server. Which port do you open to allow DNS network traffic for lookup and zone transfer? 53, Transmission Control Protocol (TCP) 53, User Datagram Protocol (UDP) 53, User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP) 53, User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)

DNS requires UDP and TCP port 53 to be open in the firewall. The UDP port is for lookup and the TCP port is for zone transfer.

You realize after an initial security sweep that there are many security problems on your network. You found one that allows pinging through your firewall. Which protocol do you deny or drop to prevent this basic security problem? Internet Control Message Protocol (ICMP) NetBIOS Ping User Datagram Protocol (UDP)

Internet Control Message Protocol (ICMP)

You want to use a Telnet program to establish a connection with a remote server, but your colleague says you shouldn't use Telnet to do so. What is the reason the use of Telnet today often discouraged? It is not supported on most modern operating systems. It is an unencrypted protocol, so packets can easily be analyzed and attackers can eavesdrop on credential input. It has difficulty establishing connections with remote servers and requires substantially more technical knowledge than other network protocols. It cannot remote into machines running different operating systems

It is an unencrypted protocol, so packets can easily be analyzed and attackers can eavesdrop on credential input.

Why is TCP port 139 dubbed "The most dangerous port on the Internet?" It is the Internet Relay Chat (IRC) port. It is the NetBIOS port. It is the original Telnet port. It is the non-secured Domain Name System (DNS) port.

It is the NetBIOS port.

Transmission Control Protocol (TCP) port 143 is the port for the Internet Message Access Protocol (IMAP) service. What is IMAP? It is the incoming email protocol similar to Post Office Protocol (POP). It is the outgoing email protocol similar to Sendmail. It is the replacement protocol for global positioning system (GPS) applications. It is the replacement protocol for NetBIOS.

It is the incoming email protocol similar to Post Office Protocol (POP).

Why do most web servers have both port 80 and port 443 configured? Port 80 is Hypertext Transfer Protocol (HTTP) and port 443 is Hypertext Transfer Protocol Secure (HTTPS). Port 80 is for web pages only and 443 is for Hypertext Transfer Protocol (HTTP) download. Port 80 is incoming and port 443 is outgoing. Port 80 is Hypertext Transfer Protocol Secure (HTTPS) and port 443 is Hypertext Transfer Protocol (HTTP).

Port 80 is Hypertext Transfer Protocol Secure (HTTPS) and port 443 is Hypertext Transfer Protocol (HTTP).

Port 110 is the traditional port for which Transmission Control Protocol (TCP) service? NetBIOS Sendmail Post Office Protocol (POP) Internet Message Access Protocol (IMAP)

Post Office Protocol (POP)

You see a lot of traffic on port 22 during one of your random network traffic samplings. You investigate further to see that, much to your relief, this protocol is one on the approved list of protocols. Which application uses Transmission Control Protocol (TCP) port 22? FTP SSH SNMP HTTP

SSH

Which of the following protocols is the predecessor to Transport Layer Security (TLS)? Secure Sockets Layer (SSL) Hypertext Transfer Protocol Secure (HTTPS) Secure Shell (SSH) Post Office Protocol Secure (POPS)

Secure Sockets Layer

What is one useful method of applying the OSI model to network security? Visualizing your network and removing the least secure layer from your network Visualizing your network and selecting the least secure layer to secure Comparing it to the TCP/IP stack and selecting the best to model your network after Securing your network by OSI layers

Securing your network by OSI layers

Identify a method to harden NetBIOS against network attacks. Create NetBIOS names that are 15 characters or shorter Create network shares as read only Set strong password policies Set up user accounts for network shares

Set strong password policies

Which early file transfer protocol is unsecured and has since been declared obsolete? Simple File Transfer Protocol (SFTP) Trivial File Transfer Protocol (TFTP) File Transfer Protocol Secure (FTPS) Secure Copy Protocol (SCP)

Simple File Transfer Protocol (SFTP) is an early, unsecured file transfer protocol that has since been declared obsolete. Secure Copy Protocol (SCP) uses SSH to securely transfer computer files between a local and a remote host, or between two remote hosts. SCP can also be implemented as a command-line utility that uses either SCP or SFTP to perform secure copying. SCP is used primarily on Unix systems. File Transfer Protocol Secure (FTPS) is also known as FTP-SSL and combines the use of FTP with additional support for SSL/TLS. Trivial File Transfer Protocol (TFTP) is a very limited protocol used primarily as an automated process of configuring boot files between machines. Because it offers almost no security, this protocol is used primarily on local networks instead of on the Internet.

You take a new job and need to collect inventory information on all connected network devices. Which universally available protocol will you use to gather this information? Simple Network Management Protocol (SNMP) Session Control Protocol (SCP) Hypertext Transfer Protocol (HTTP) Trivial File Transfer Protocol (TFTP)

Simple Network Management Protocol (SNMP)

Your task is to secure your websites and your email servers. Which security protocol will you use to ensure an encrypted channel? Secure Shell (SSH) Transport Layer Security (TLS) Hypertext Transfer Protocol (HTTP) Wired Equivalent Privacy (WEP)

The TLS protocol is the one to select from this list because of its encryption and secure channel communications. HTTP is not secure. SSH is an interactive shell protocol. WEP is a wireless security protocol for connecting to wireless access points.

Your task is to secure your websites and your email servers. Which security protocol will you use to ensure an encrypted channel? Wired Equivalent Privacy (WEP) Secure Shell (SSH) Hypertext Transfer Protocol (HTTP) Transport Layer Security (TLS)

The TLS protocol is the one to select from this list because of its encryption and secure channel communications. HTTP is not secure. SSH is an interactive shell protocol. WEP is a wireless security protocol for connecting to wireless access points.

Some of the application developers in your organization have a concern about the security of data transmitted between your servers and storage over Internet Small Computer System Interface (iSCSI) connections. What can you do to mitigate the vulnerability? Place the storage arrays into the demilitarized zone (DMZ). Place the storage arrays into a private cloud. Set up a private network between the storage arrays and the servers. Set up Internet Protocol Security (IPSec) between the storage arrays and the servers.

To resolve the problem of non-secure communications between the storage arrays and the servers over iSCSI, you have to set up an encryption scheme such as IPSec. Be warned, however, that encryption sacrifices performance.

From a security standpoint, what is the most relevant reason for understanding the Open Systems Interconnection (OSI) model? To better identify bottlenecks and create plans for remedies To make it easier to identify threats, targets, and their impacts To understand network failures and fixes To better design secure and scalable networks

While all of the options are true in terms of generally understanding the OSI model, the purpose of understanding the OSI model from a security perspective is to make it easer to identify threats, vulnerable targets, and their impacts on the network and overall security. For example, securing your network by layers is a useful strategy in securing your network entirely, as the layers are designed to integrate with each other.


Conjuntos de estudio relacionados

Chapter 7 (Cancer)- Study Guide Questions

View Set

Chapter 2: Intro to Optimization and Linear Programming

View Set

The Characteristics of Nonverbal Communication (Patrice)

View Set

Chapter 1 (There will be only 1-2 questions on the exam)

View Set

BUS 210 -Chapter 2 and 3 Study Guide for Exam 1

View Set