System Security (CINS-220) UNIT II (Chapter 5-8) EXAM practice

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is mutual authentication?

A process by which each party in an online communication verifies the identity of the other party.

What is the process of controlling access to resources such as computers, files, or printers called?

Authorization

Which of the following applies the appropriate policies in order to provide a device with the access it's defined to receive?

Authorization

For users on your network, you want to automatically lock user accounts if four incorrect passwords are used within ten minutes.

Configure account lockout policies in Group Policy

A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)

Configure the VPN connection to use IPsec Configure the browser to send HTTPS requests through the VPN connection

Which of the following NAC agent types creates a temporary connection?

Dissolvable

Which type of interference is caused by motors, heavy machinery, and fluorescent lights?

EMI

KWalletManager is a Linux-based credential management system that stores encrypted account credentials for network resources. Which encryption methods can KWalletManager use to secure account credentials? (Select two.)

GPG Blowfish

Which type of attack is WEP extremely vulnerable to?

IV Attack

At which layer of the OSI model do NAT routers operate?

Layer 3 (Network layer)

Which of the following principles is implemented in a mandatory access control model to determine object access by classification level?

Need to Know

Which of the following is the MOST likely to happen if the firewall managing traffic into the DMZ fails?

Only the servers in the DMZ are compromised, but the LAN will stay protected.

Which of the following NAC agent types is the most convenient agent type?

Permanent

What is the primary purpose of separation of duties?

Prevent conflicts of interest

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.)

RADIUS TACACS+

Which of the following can be classified as a stream cipher?

RC4

Which of the following is used by Microsoft for auditing in order to identify past actions performed by users on an object?

SACL

Which of the following is used on a wireless network to identify the network name?

SSID

As the security analyst for your organization, you have noticed an increase in user computers being infected with malware. Which two solutions should you implement and configure to remedy this problem? (Select two.)

Spam filters Virus scanner

You have configured your ACL to block outgoing traffic from a device with the IP address 192.168.1.52. Which type of ACL have you configured?

Standard

You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network. You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website. What should you use to allow access?

Static NAT

Which of the following are features of an application-level gateway? (Select two.)

Stops each packet at the firewall for inspection Reassembles entire messages

A virtual LAN can be created using which of the following?

Switch

When configuring VLANs on a switch, what is used to identify which VLAN a device belongs to?

Switch port

Which of the following would require that a certificate be placed on the CRL?

The private key is compromised.

You are deploying a brand new router. After you change the factory default settings, what should you do next?

Update the firmware.

Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstation they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems. Which of the following is the MOST important aspect of maintaining network security against this type of attack?

User education and training

You have just configured the password policy and set the minimum password age to 10. What is the effect of this configuration?

Users cannot change the password for 10 days.

Which of the following is commonly created to segment a network into different zones?

VLANs

You have a group named Research on your system that needs a new password because a member of the group has left the company. Which of the following commands should you use?

gpasswd Research


Kaugnay na mga set ng pag-aaral

Psychology Exam 1 - Practice Exam and NOBA Questions

View Set

Claywell ch 8 EBP decision making (2 questions)

View Set

Misplaced and Dangling Modifiers

View Set

Chapter 10 - Special Driving Conditions

View Set

Chapter 1: Athletic Training as a Profession Key Terms

View Set