IT Test Practice
When designing a firewall solution, what is the recommended approach for incoming and outgoing ports? Responses A Close all ports;open only ports required by applications inside the network B Close all ports;only open ports 20, 21, 53, 80 and 443 C Open all ports; close ports that expose common network attacks D Close all ports E Open all ports; close ports that show improper traffic or attacks in progress
A
Which of the following NAC agent types would be used for IoT devices? Responses A Agentless B Zero-trust C Dissolvable D Permanent
Agentless
Place the steps in the NAC implementation process in order from start to finish. not all options are used. Plan, Define, Review/Test, Apply
PDAR
Which of the following defines all the prerequisites a device must meet in order to access a network? Responses A Authorization B Zero-trust security D Authentication E Identity Services Engine
A
Out of the choices listed, which are characteristics of basic packet filtering (stateless) firewall? Select two choices Responses A filters IP address and port B Stateless C filters based on URL D Stateful filters based on sessions
A, B
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use? (Select three) Responses A Source address of a packet B Checksum C Digital signature D Port number E Destination address of the packet F Sequence number G Acknowledgement number
A, B, C
Which of the following defines all the prerequisites a device must meet in order to access a network? Responses A Authorization B Zero-trust security C Identity Services Engine D Authentication
Authentication
Which of the following happens by default when you create and apply a new ACL on a router? Responses A the ACL is ignored until it is applied B all traffic is permitted C all traffic is blocked D ACLs are not created on routers
B
Which of the following options best describes a stateful inspection? Responses A offers secure connectivity between many entities and uses encryption to provide an effective defense against sniffing attacks B determines the legitimacy of traffic based on the state of the connection, from which traffic originated C allows all internal traffic to share a single public IP address when connecting to an outside network D designed to sit between a host and web server and communicate with the server on behalf of the host
B
Which statement describes agentless antivirus protection? Responses A antivirus is provided by the ISP B antivirus scans are performed on hosts from a centralized system C antivirus protection is provided by the router that is connected to a cloud service D host based antivirus systems provide agentless AV protection
B
You are deploying a new router at an enterprise location. After you change the factory default settings, what is a good next step? Responses A update the firmware B secure the configuration file C configure anti-spoofing rules D configure SSH to access the router configuration
B
Out of the choices listed, which are characteristics of basic packet filtering firewall? Select two choices Responses A filters based on sessions B filters IP address and port C filters based on URL D Stateful E Stateless
B, E
An attacker was able to gain unauthorized access to a mobile phone and install a Trojan horse so that he or she could bypass security controls and reconnect later. Responses A Replay B Social engineering C Backdoor D Privilege escalation
C
Which device in a LAN infrastructure is suspecptible to MAC address overflow and spoofing attacks? Responses A router B workstation C switch D firewall
C
Which of the following NAC agent types would be used for IoT devices? Responses A Permanent B Dissolvable C Agentless D Zero-trust
C
In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location? Responses A IPS/IDS B safe browsing C anti phishing D telemetry
D
What is a host-based intrusion detection system (HIDS)? Responses A it identifies potential attacks and sends alerts but cannot stop traffic B it is an agentless system that scans files on a host for potential malware C it detects and can stop potential direct attacks but does not scan for malware D it combines the capabilities of antimalware applications with firewall applications
D
Which of the following happens by default when you create and apply a new ACL on a router? Responses A all traffic is blocked B all traffic is permitted C the ACL is ignored until it is applied D ACLs are not created on routers
all traffic is blocked
Which of the following options best describes a stateful inspection? Responses A allows all internal traffic to share a single public IP address when connecting to an outside network B determines the legitimacy of traffic based on the state of the connection, from which traffic originated C designed to sit between a host and web server and communicate with the server on behalf of the host D offers secure connectivity between many entities and uses encryption to provide an effective defense against sniffing attacks
determines the legitimacy of traffic based on the state of the connection, from which traffic originated
Which statement describes agentless antivirus protection? Responses A antivirus protection is provided by the router that is connected to a cloud service B antivirus scans are performed on hosts from a centralized system C antivirus is provided by the ISP D host based antivirus systems provide agentless AV protection
host based antivirus systems provide agentless AV protection
What is a host-based intrusion detection system (HIDS)? Responses A it identifies potential attacks and sends alerts but cannot stop traffic B it detects and can stop potential direct attacks but does not scan for malware C it is an agentless system that scans files on a host for potential malware D it combines the capabilities of antimalware applications with firewall applications
it combines the capabilities of antimalware applications with firewall applications
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat? routing-based behavior-based signature-based heuristics-based
signature-based