Module11 Security in Network Design

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

Separation of duties

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context

Set a limit on consecutive login attempts

What information in a transmitted message might an IDS use to identify network threats?

Signature

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit https any any

Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario.

A host-based firewall

At what layer of the OSI model do proxy servers operate?

Layer 7

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won't receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?

Proxy server

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?

Stateless firewall

You are the network engineer for Muhan Mobile Services. The network administrator has asked you to separate the authentication, auditing, and authorization process. Which of the following tools will you use in such a scenario?

TACACS+

Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario.

police 8000 conform-action transmit exceed-action drop

You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario?

ACL

Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?

IPS

Which policy ensures messages are discarded when they don't match a specific firewall rule?

Implicit deny

Which authorization method allows a network administrator to receive from a user's supervisor a detailed description of the roles or jobs the user performs for the organization?

RBAC

Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?

SoD

Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

Administration

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

Application data

The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees' access to these websites. Which of the following firewalls will you use in this scenario?

Application layer firewall

Identify which of the following terms defines the process of verifying a user's credentials.

Authentication

Who is responsible for the security of hardware on which a public cloud runs?

The cloud provider

You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?

DAI

Which device would allow an attacker to make network clients use an illegitimate default gateway?

DHCP server

Which of the following technologies selectively filters or blocks traffic between networks?

Firewall

A special kind of DoS (denial of service) attack has attacked an AAA server with authentication requests that must all be processed and responded to. The network administrator has analyzed the situation and requested you, a network engineer, to use a command by which you can reclaim compromised resources in case of a similar attack in the future. Which of the following commands will you use in this scenario?

floodguard


Ensembles d'études connexes

Earthquakes and Earth's Interior

View Set

Life and Health Simulation Exam Missed Questions

View Set

CHFI - Chapter 6 (Operating System Forensics)

View Set

A&P Chapter 14: Brain and Cranial Nerves

View Set

Prep U's - Chapter 1 - Professional Nursing Practice

View Set

Chapter 23: perioperative nursing

View Set

Epithelial Tissue: Structure and Function

View Set

99. - 152. Later Europe and the Americas

View Set