ITN 263 - Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Thirty years ago, a major corporation purchased and still owns IP addresses within the IPv4 Class A range. The corporation uses these addresses to connect to the Internet. To which IPv4 address range do they belong? 192.168.0.0 to 192.168.255.255 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 1.0.0.1 to 126.255.255.254

1.0.0.1 to 126.255.255.254

Mario is the network security engineer for his company. He discovered that, periodically, a remote user working from home accesses certain resources on the network that are not part of her regular duties. Mario has questioned the user and her supervisor, and has accessed the user's workstation. Mario believes the user is not the source of these intrusions and strongly suspects a malicious source is responsible. What is the most likely explanation? An external hacker has gained access to the user's authentication and is accessing confidential company resources. The user requires periodic access to data that is only sometimes part of her job duties. Mario has erroneously interpreted the firewall logs, and the user has not accessed such data. The user has fooled Mario into believing her innocence and she really is the malicious intruder.

An external hacker has gained access to the user's authentication and is accessing confidential company resources

In executing the processes of risk assessment and risk management, which statistic calculates the potential number of times the threat could be a realized attack in a year's time? Exposure factor Annualized rate of occurrence Single loss expectancy Annualized loss expectancy

Annualized rate of occurrence

Devaki is an engineer who is designing network security for her company's infrastructure. She is incorporating protections for programming flaws, default settings, maximum values, processing capabilities, and memory capacities on devices, as well as malicious code and social engineering. What is this type of protection called? Single point of failure avoidance Defense in depth Security through obscurity Divide and conquer

Defense in depth

The network engineer of a mid-size company needs to have all servers, network printers, and other online resources possess the same IPv4 address over time. The engineer does not want to perform manual address assignments on all of these resources. Additionally, she wants to prevent any rogue device from having an IPv4 address dynamically assigned just by making the request. What is her solution? Static addressing of the most vital network resources Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol (DHCP) reservation Using static addressing and a hardware firewall

Dynamic Host Configuration Protocol (DHCP) reservation

One technique for hardening a system is to remove all protocols

False

Private IP addresses can communicate directly with Internet resources.

False

Prospective cost is money paid or an investment made in the past.

False

Static IP addressing hands out IP addresses to hosts from a pool.

False

The IP address range of 192.168.0.0-192.168.255.255/16 is the Class A range.

False

With multifactor authentication, facial geometry is an example of something you know.

False

Isabelle is the cybersecurity engineer for a medium-sized company. She is setting up a firewall for examining inbound network traffic for a variety of characteristics. While remote users working from home should be allowed access to network resources, malicious traffic should be blocked. To differentiate between the two, Isabelle is looking at factors such as whether the inbound traffic is a response to a previous request inside the network; whether it includes blocked domain names, IP addresses, and protocols; and whether it conforms to known malicious patterns or is otherwise abnormal. What is she setting up the firewall to practice? Access management Filtering Modeling Encryption

Filtering

Removing all unnecessary protocols, uninstalling all unnecessary applications and services, and installing the latest final releases of all device drivers are part of which security process? Portability Hardening Auditing Anti-spoofing

Hardening

Location-aware anti-theft software will periodically upload its location to a centralized site in the event that the mobile device is lost or stolen. What can defeat this? If the mobile device is taken more than five miles away from its original location If the thief uploads an anti-malware program onto the mobile device If the thief reformats the mobile device's drive If the thief disables Wi-Fi

If the thief reformats the mobile device's drive

Nicolau is a network engineer for a large online retailer. He is concerned about the security of his company's network connections to its customers, vendors, and partners. Although all of these sources are generally trusted, he knows they can be hacked by malicious parties and used to steal confidential company data. Which network-based solution should he choose to detect unauthorized user activity and attacks that is also capable of taking action to prevent a breach? Intrusion detection system/intrusion prevention system (IDS/IPS) Data encryption Router anti-tampering Firewall

Intrusion detection system/intrusion prevention system (IDS/IPS)

The chief information officer (CIO) of a large company has been informed by the board of directors that their corporation is anticipating rapid growth over the next two years. She calculates the contingency of building additional capacity into the current network infrastructure. Based on the board's growth estimates, what percentage of additional capacity should she plan for? 20 percent 10 percent More than 50 percent 30 percent

More than 50 percent

Although it is not recommended, a company chief information officer (CIO) wants to configure and use the ff02::1 group on his new IPv6 network to send traffic to every node in the infrastructure. What group must he enable? Anycast Multicast Unicast Multicast to the all-nodes group

Multicast to the all-nodes group

Thuan is a new network engineer. He is increasing the security of end-user computers. Which of the following is a security feature every client computer needs? RAID BYOD Clustering Password-protected screen saver

Password-protected screen saver

Which of the following network zones has the lowest risk and the highest trust? Extranet Private network Internet Demilitarized zone (DMZ)

Private Network

Gino is an ethical hacker hired as a consultant to test the security of a mid-sized company's network. As part of his assignment, he has been given physical access to the system. He has built a dictionary of hashed passwords from the hard drive of the device. Which type of attack is he planning to launch? Rainbow Hybrid Brute force Dictionary

Rainbow

The chief information officer (CIO) is working with the chief financial officer (CFO) on next year's budget for new networking equipment. The CIO is explaining that lowest-cost equipment is not the sole deciding factor. The hardware must conform to high security standards to prevent a malicious person from hacking into the network and accessing valuable company data. Which of the following considerations does not specifically require a hacker to have physical access to the equipment? Remote connection Portability Removable case Reset button

Remote Connection

Every morning when James logs into his computer and attempts to access Microsoft 365, he is asked to enter his password. After that, he is sent a text on his mobile phone with a six-digit code he must enter. In terms of multifactor authentication, his password is something he knows. What is the text message? Something he knows Something he is or does Something he has Something he types

Something he has

A hacker is attempting to access a company's router using false Internet Control Message Protocol (ICMP) type 5 redirect messages. What is the hacker's goal? To add false entries into the router's access control list To delete all of the device's routing protocols To spoof or manipulate routing data To bypass the firewall

To spoof or manipulate routing data

A Dynamic Host Configuration Protocol (DHCP) system automatically assigns IP addresses on network.

True

A good practice is to trust no network traffic until it is proved to comply with security policy

True

An IPv6 address consists of 128 bits; an IPv4 address consists of 32 bits.

True

Authentication is the verification or proof of someone's or something's identity.

True

IT infrastructure growth can be expected, unexpected, gradual, or abrupt.

True

In a risk assessment, the asset value (AV) includes both tangible and intangible costs.

True

Network router security is primarily about preventing unauthorized access.

True

Networked systems that are no longer used or monitored can become network entry points for hackers.

True

One contingency for growth is to build additional capacity into the current infrastructure.

True

Outbound network traffic should be subjected to the same investigations and analysis as inbound network traffic.

True

Redundancy is the act of avoiding single points of failure.

True

TCP/IP is a suite of two communication protocols.

True

The Internet Assigned Numbers Authority (IANA) is responsible for global coordination of IP addressing.

True

When considering network expenditures, sunk costs should not influence future choices.

True

Nahla is a network engineer charged with maintaining the routine operations of equipment in her company's server room. She is aware that fluctuations in electrical power flow can damage delicate circuitry. While configuring redundancy into a number of systems, which component does she choose that offers both redundancy and power conditioning? Intrusion prevention system (IPS) Uninterruptable power supply (UPS) Redundant array of inexpensive disks (RAID) Intrusion detection system (IDS)

Uninterruptable power supply (UPS)

Dhruv is the lead network engineer for his three-year-old company. He is writing a proposal that recommends the network protocol to use in several branch offices. Based on the age of the networking equipment, what is his recommendation to the chief information officer (CIO)? Upgrade to IPv6 Transition from Post Office Protocol (POP) to Simple Mail Transfer Protocol (SMTP) Transition to IPX/SPX Continue to use IPv4

Upgrade to IPv6

Santiago is a new network engineer for a mid-sized company. It is his responsibility to ensure that all employees working from home are able to connect to the office network in an efficient and secure manner. He must provide a service that allows communications between out-of-office staff and network resources to be encrypted at the protocol level and to be performed by either client or server software. The solution must also ensure that even if protocol encryption fails, the data is safe by its own encryption. What solution does he select? Authentication, authorization, and accounting (AAA) Virtual private network (VPN) Identity and access management (IAM) Implementation of a demilitarized zone (DMZ)

Virtual Private Network(VPN)


Ensembles d'études connexes

System Conversion to SAP S/4 HANA - wk 1

View Set

Clean Code Chap 7 Error Handling

View Set

The verb to say in Past Tense in Arabic الفعل قال في الماضي مَعَ ضمائر المُفرد والمُثنى و الجمع

View Set

I. PRAWO CYWILNE CERTYFIKAT KOMPETENCJI ZAWODOWYCH PRZEWOŹNIK DROGOWY

View Set