Security+ Chapter 4 Practice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

8. You need to provide connectivity between two buildings without running any cables. You decide to use two WAPs and a high-gain directional antenna. Which of the following antennas is the BEST choice to meet this need? A. Yagi B. Omni C. Isotropic D. Dipole

A. A Yagi antenna is a high-gain directional antenna with a very narrow radiation pattern and is an ideal choice for this scenario. An isotropic antenna is theoretical and indicates the signal goes in all directions equally. Omnidirectional and dipole antennas attempt to mimic an isotropic antenna, but have stronger gains horizontally then vertically, assuming they are standing vertically.

14. Homer is able to connect to his company's wireless network with his smartphone but not with his laptop computer. Which of the following is the MOST likely reason for this disparity? A. His company's network has a MAC address filter in place. B. His company's network has enabled SSID broadcast. C. His company's network has enabled CCMP. D. His company's network has enabled WPA2 Enterprise.

A. A media access control (MAC) address filter allows (or blocks) devices based on their MAC addresses, so it is likely that the filter is allowing Homer's smartphone but not allowing his laptop computer. Enabling the service set identifier (SSID) makes the network easier to see by casual users, but it does not block access even if SSID broadcast is disabled. Wi-Fi Protected Access II (WPA2) and Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) both provide strong security, but they do not differentiate between devices.

18. An attacker is able to access email contact lists on your smartphone. What type of attack is this? A. Bluesnarfing B. War chalking C. War driving D. Bluejacking

A. Attackers are able to access data (including email contact lists) on a smartphone in a bluesnarfing attack. War chalking is the practice of marking the location of wireless networks. War driving is the practice of looking for wireless networks, often by driving around. Bluejacking is the practice of sending unsolicited messages to other Bluetooth devices.

1. Which of the following network tools includes sniffing capabilities? A. IDS B. WAP C. VPN D. NAC

A. Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) include sniffing capabilities allowing them to inspect packet streams for malicious activity. None of the other tools have the capability of inspecting packets. A wireless access point (WAP) provides access to a wired network for wireless devices. A virtual private network (VPN) provides access to an internal network for remote users. A network access control (NAC) system inspects clients to ensure they meet minimum security requirements.

13. You are assisting a small business owner in setting up a public wireless hot spot for her customers. Which of the following actions are MOST appropriate for this hot spot? A. Enabling Open System Authentication B. Enabling MAC filtering C. Disabling SSID broadcast D. Installing Yagi antennas

A. Open System Authentication is the best choice of those given for a public wireless hot spot. It is used with Wired Equivalent Privacy (WEP), doesn't require users to enter a preshared key or passphrase, and doesn't require the business owner to give out this information. It's also possible to disable security for the hot spot. Media access control (MAC) address filtering would be very difficult to maintain. Disabling service set identifier (SSID) broadcasting would make it difficult to find the wireless network, and installing a directional Yagi antenna isn't appropriate for a hot spot that needs an omnidirectional antenna.

12. Your organization is planning to implement a wireless network using WPA2 Enterprise. Of the following choices, what is required? A. An authentication server with a digital certificate installed on the authentication server B. An authentication server with DHCP installed on the authentication server C. An authentication server with DNS installed on the authentication server D. An authentication server with WEP running on the access point

A. WPA2 Enterprise requires an 802.1x authentication server and most implementations require a digital certificate installed on the server. The network will likely have Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) services, but it isn't necessary to install them on the authentication server. Wired Equivalent Privacy (WEP) provides poor security and is not compatible with WPA2 Enterprise.

4. Administrators have noticed an increased workload recently. Which of the following can cause an increased workload from incorrect reporting? A. False negatives B. False positives C. Separation of duties D. Signature-based IDSs

B. False positives can cause an increased workload because they falsely indicate an alert has occurred. A false negative doesn't report an actual attack, so it doesn't increase the workload because administrators are unaware of the attack. Separation of duties ensures a single person can't control an entire process, so it is unrelated to increased workload. Signature-based intrusion detection systems (IDSs) don't necessarily cause an increased workload unless they have a high incidence of false positives.

2. A HIDS reported a vulnerability on a system using an assigned vulnerability identification number. After researching the number on the vendor's web site, you identify the recommended solution and begin applying it. What type of HIDS is in use? A. Network-based B. Signature-based C. Heuristic-based D. Anomaly-based

B. If the issue has an assigned number, it must be known, so it is signature-based. A host-based intrusion detection system (HIDS) is not network-based. A heuristic-based (or anomaly-based) detection system catches issues that are not previously known.

9. You are assisting a user implement a wireless network in his home. The wireless hardware he has requires the RC4 protocol. What type of security is BEST for this network? A. WEP B. WPA-TKIP C. WPA-AES D. WPA2 Enterprise

B. Temporal Key Integrity Protocol (TKIP) uses RC4 and is compatible with older hardware so Wi-Fi Protected Access (WPA) with TKIP is the best option for this network. Wired Equivalent Privacy (WEP) uses RC4, but it is not secure and should not be used. WPA with Advanced Encryption Standard (AES) is stronger, but it uses AES instead of RC4. Wi-Fi Protected Access II (WPA2) Enterprise requires an 802.1x server and does not use RC4.

17. Your organization hosts three wireless networks for different purposes. A recent site survey audit discovered the information shown in the following table: SSID Security Channel Power GetCertifiedVisitors WPA2 1 71 dBm GetCertifiedEmployee WPA2 2 94 dBm GetCertifiedEmployees WPA2 3 73 dBm GetCertifiedKiosk WPA2 5 79 dBm What does this indicate? A. Evil twin B. Rogue access point C. Interference D. Near field communication

B. This indicates a rogue access point because the organization is hosting three wireless networks, but the survey found four. A rogue access point typically has a similar name (such as GetCertifiedGetEmployee in this example). An evil twin will have the exact name as an authorized WAP. An interference or jamming attack would make it difficult to connect to the access points causing users to disconnect often. Near field communication (NFC) refers to two devices communicating when they are close to each other and is unrelated to this scenario.

5. A security company wants to identify and learn about current and new attack methodologies. Which of the following is the BEST choice to meet this objective? A. Pen test B. HIDS C. Honeypot D. Firewall logs

C. A honeypot is a server designed to look valuable to an attacker and can help administrators learn about zero-day exploits, or previously unknown attacks. Security personnel perform a pen test (or penetration test) to determine if attackers can exploit existing vulnerabilities, but attackers may not try to do so. A host-based intrusion detection system (HIDS) attempts to detect intrusions on an individual host, but may not catch new methods against the network. Firewall logs can log connections, but don't identify new attack methods.

3. Management is concerned about malicious activity on your network and wants to implement a security control that will detect unusual traffic on the network. Which of the following is the BEST choice to meet this goal? A. Network firewall B. Signature-based IDS C. Anomaly-based IDS D. Honeypot

C. An anomaly-based (also called heuristic or behavior-based) detection system compares current activity with a previously created baseline to detect any anomalies or changes. A network firewall blocks and allows traffic, but does not detect unusual traffic. Signature-based systems use signatures similar to antivirus software. A honeypot is a server designed to look valuable to an attacker and can divert attacks.

7. Your network IDS recently detected an attack on a server. Upon investigation, you discover that the IDS does not have a signature on this attack. Instead, the IDS detected it using a heuristic analysis. Of the following choices, what is the MOST likely category of this attack? A. Definition B. CVE C. Zero-day D. Phishing

C. Heuristic analysis has the best chance of detecting a zero-day attack. A zero-day attack is one that is unknown to vendors and because this attack doesn't have a signature, it is most likely unknown. Definition-based intrusion detection systems (IDSs) are the same as signature-based IDSs. Many signatures are based on the Common Vulnerabilities and Exposures (CVE) list. A phishing attack is an email, not an attack on a server.

19. Your organization is planning to implement a VPN and wants to ensure it is secure. Which of the following protocols is the BEST choice to use with the VPN? A. HTTP B. SFTP C. IPsec D. PPTP

C. Internet Protocol secure (IPsec) is one of several protocols used to secure virtual private network (VPN) traffic. It is the best choice of the available answers. Hypertext Transfer Protocol (HTTP) doesn't provide any security. Secure File Transfer Protocol (SFTP) secures FTP transmissions but not VPNs. Point-to-Point Tunneling Protocol (PPTP) is an older protocol used with VPNs, but it is not as secure as IPsec.

15. Management asks you if you can modify the wireless network to prevent users from easily discovering it. Which of the following would you modify to meet this goal? A. CCMP B. WPA2 Enterprise C. SSID broadcast D. MAC address filter

C. You can disable service set identifier (SSID) broadcasting to prevent users from easily discovering the wireless networks. None of the other methods hide the network. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) provides stronger security for Wi-Fi Protected Access II (WPA2) and WPA2 Enterprise adds authentication for a wireless network. Media access control (MAC) address filtering can restrict access to the wireless network.

16. A war driver is capturing traffic from a wireless network. When an authorized client connects, the attacker is able to implement a brute force attack to discover the encryption key. What type of attack did this war driver use? A. WPS attack B. IV attack C. Packet injection D. WPA cracking

D. A Wi-Fi Protected Access (WPA) cracking attack captures traffic and then performs an offline brute force attack to discover the encryption key. Wi-Fi Protected Setup (WPS) attacks also use a brute force attack, but do not need to wait for an authorized client to connect. Initialization vector (IV) attacks often use packet injection techniques to generate more traffic in Wired Equivalent Privacy (WEP) attacks.

6. Of the following choices, what can you use to divert malicious attacks on your network away from valuable data to worthless fabricated data? A. IPS B. Proxy server C. Web application firewall D. Honeypot

D. A honeypot can divert malicious attacks to a harmless area of your network, such as away from production servers holding valid data. An intrusion prevention system (IPS) can block attacks, but it doesn't divert it. A proxy server can filter and cache content from web pages, but doesn't divert attacks. A web application firewall (WAF) is an additional firewall designed to protect a web application.

20. An automated process isolated a computer in a restricted VLAN because the process noticed the computer's antivirus definitions were not up to date. What is the name of this process? A. NFC B. NIPS C. NIDS D. NAC

D. Network access control is a group of technologies that can inspect systems and control their access to a network. In this scenario, NAC changed the computer's IP address to quarantine it in a restricted virtual local area network (VLAN). Near field communication (NFC) refers to standards that allow mobile devices to communicate with each other and is not related to VLANs. Network-based intrusion prevention systems (NIPSs) and network-based intrusion detection systems (NIDSs) protect a network from intrusions, but do not quarantine internal systems.

10. You want to implement the STRONGEST level of security on a wireless network. Which of the following supports this goal? A. Implementing WEP B. Disabling SSID broadcast C. Enabling MAC filtering D. Implementing WPA2

D. Wi-Fi Protected Access II (WPA2) provides the strongest level of security of the available answers. Wired Equivalent Privacy (WEP) is weak and should not be used. Disabling service set identifier (SSID) broadcast hides the network from casual users, but attackers can still discover it because the SSID is still included in some packets in plaintext. Attackers can bypass media access control (MAC) address filtering by spoofing authorized MAC addresses.

11. You are planning to deploy a WLAN and you want to ensure it is secure. Which of the following provides the BEST security? A. WEP Enterprise B. WPA2 TKIP C. SSID broadcast D. WPA2 CCMP

D. Wi-Fi Protected Access II (WPA2) with Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) provides the best security of those listed. Wired Equivalent Privacy (WEP) is not secure and is not available in Enterprise mode. CCMP is stronger than Temporal Key Integrity Protocol (TKIP). Service set identifier (SSID) broadcast indicates the network name is broadcast, but this doesn't provide any security. If SSID broadcast is disabled, it hides the network from casual users, but attackers can still see it.


Ensembles d'études connexes

Age Lecture 12-Identity & the Self

View Set

practice test for science unit 3 test

View Set

Chapter 14: Bonds and Long-Term Notes

View Set

International Trade, Transport and Logistics Exam

View Set

Renal, Genitourinary, Reproductive

View Set

9.1 BASIC MATH - BASIC MILL OPERATOR

View Set