Security Pro Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Choose the appropriate cloud technology for the description below: -Provides cloud services to just about anyone. A.)Public cloud B.)Private cloud C.)Community cloud D.)Hybrid cloud

A

Network-based intrusion detection is most suited to detect and prevent which types of attacks? A.)Bandwidth-based denial of service B.)Buffer overflow exploitation software C.)Brute force password attack D.)Application implementation flaws

A

RADIUS is primary used for what purpose? A.)Authenticating remote clients before access to the network is granted B.)Managing access to a network over a VPN C.)Controlling entry gate access using proximity sensors D.)Managing RAID fault-tolerant drive configurations

A

Which phase or step of a security assessment is a passive activity? A.)Reconnaissance B.)Vulnerability C.)Enumeration D.)Privilege escalation

A

You have run a vulnerability scanning tool and identified several patches that need to be applied to a system. What should you do next after applying the patches? A.)Run the vulnerability assessment again B.)Document your actions C.)Use a port scanner to check for open ports D.)Update the vulnerability scanner definition files

A

You want to set up a service to allow multiple users to dial in to the office server from modems on their home computers. What service should you implement? A.)RAS B.)ISDN C.)RIP D.)PPP

A

Which ports does LDAP use by default? (Select two.) A.)389 B.)110 C.)161 D.)636 E.)69

A and D

Which of the following statements about virtual networks is true? (Select two.) A.)Multiple virtual networks can be associated with a single physical network adapter. B.)Each virtual network must be associated with a single physical network adapter. C.)A virtual network is independent of the configuration and physical hardware of the host operating system. D.)Accessing network resources requires that the operating system on the virtual machine be configured on an isolated network. E.)A virtual network is dependent on the configuration and physical hardware of the host operating system.

A and E

Select the software-defined networking (SDN) layer for the function listed below: -This layer is also known as the infrastructure layer. A.)Control layer B.)Physical layer C.)Application layer

B

What is the primary purpose of penetration testing? A.)Infiltrate a competitor's network B.)Assess the skill level of new IT security staff C.)Test the effectiveness of your security perimeter D.)Evaluate newly deployed firewalls

C

Which of the following are required when implementing Kerberos for authentication and authorization> (Select two.) A.)PPP B.)PPPoE C.)Ticket granting server D.)RADIUS or TACACS+ server E.)Time synchronization

C and E

Which of the following devices can monitor a network and detect potential security attacks? A.)Proxy B.)DNS server C.)CSU/DSU D.)Load balancer E.)IDS

E

A security administrator logs on to a Windows server on her organization's network. She then runs a vulnerability scan on that server. What type of scan was conducted in the scenario? A.)Credentialed scan B.)Non-credentialed scan C.)TCP SYN scan D.)Ping scan

A

A virtual LAN can be created using which of the following? A.)Switch B.)Gateway C.)Hub D.)Router

A

As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement? A.)Host-based IDS B.)Protocol analyzer C.)VPN concentrator D.)Port scanner E.)Network-based IDS

A

As a security professional, you need to understand your network on multiple levels. You should focus on the following areas: *Entry points *Inherent vulnerabilities *Documentation *Network baseline Choose the area of focus for the example listed below: -An older version of Windows that is used for a particular application. A.)Inherent vulnerabilities B.)Documentation C.)Entry points D.)Network baseline

A

As a security professional, you need to understand your network on multiple levels. You should focus on the following areas: *Entry points *Inherent vulnerabilities *Documentation *Network baseline Choose the area of focus for the example listed below: -IoT and SCADA devices. A.)Inherent vulnerabilities B.)Documentation C.)Entry points D.)Network baseline

A

In which of the following situations would you use port security? A.)You want to restrict the devices that could connect through a switch port. B.)You want to prevent sniffing attacks on the network. C.)You want to prevent MAC address spoofing. D.)You want to control the packets sent and received by a router.

A

Select the network attack technique for the example listed. -Attempting to find the root password on a web server by brute force. A.)Active attack B.)External attack C.)Passive attack

A

Select the network attack technique for the example listed. -Perpetrators attempt to compromise or affect the operates of a system. A.)Active attack B.)External attack C.)Passive attack

A

Select the penetration test name for the penetration characteristic listed below: -The tester has detailed information about the target system prior to starting the test. A.)White box test B.)Grey box test C.)Black box test D.)Single blind test E.)Double blind test

A

Select the software-defined networking (SDN) layer for the function listed below: -This layer provides the physical layer with configuration and instructions. A.)Control layer B.)Physical layer C.)Application layer

A

Select the software-defined networking (SDN) layer for the function listed below: -This layer receives its requests from the application layer. A.)Control layer B.)Physical layer C.)Application layer

A

Select the switch attack type for the description below: -The source device sends frames to the attacker's MAC address instead of the correct device. A.)ARP Spoofing/Poisoning B.)Dynamic Trunking Protocol C.)MAC Flooding D.)MAC Spoofing

A

Software-defined networking (SDN) uses a controller to manage the devices. The controller is able to inventory hardware components in the network, gather network statistics, make routing decisions based on gathered data, and facilitate communication between devices from different vendors. It can also be used to make wide-spread configuration changes on just one device. Which of the following best describes an SDN controller? A.)The SDN controller is software. B.)The SDN controller is a networking protocol. C.)The SDN controller is hardware. D.)The SDN controller is a virtual networking device.

A

What do host-based intrusion detection systems often rely upon to perform detection activities? A.)Host system auditing capabilities B.)External sensors C.)Remote monitoring tools D.)Network traffic

A

What is the main difference between vulnerability scanning and penetration testing? A.)Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter. B.)The goal of vulnerability scanning is to identify potential weaknesses; the goal of penetration testing is to attack a system. C.)Vulnerability scanning is performed with a detailed knowledge of the system; penetration testing begins with no knowledge of the system. D.)Vulnerability scanning uses approved methods and tools; penetration testing uses hacking tools.

A

When using Kerberos authentication, which of the following terms is used to describe the token that verifies the user's identify to the target system? A.)Ticket B.)Coupon C.)Voucher D.)Hashkey

A

Which of the following attacks, if successful, causes a switch to function like a hub? A.)MAC filtering B.)Replay C.)ARP poisoning D.)MAC spoofing

A

Which of the following authentication mechanisms is designed to protect a nine-character password from attacks by hashing the first seven characters into a single hash and then hashing the remaining two characters into another separate hash? A.)LANMAN B.)LDAP C.)NTLM D.)NTLMv2

A

Which of the following describes a false positive when using an IPS device? A.)Legitimate traffic being flagged as malicious B.)The source address identifying a non-existent host C.)Malicious traffic not being identified D.)The source address matching the destination address E.)Malicious traffic masquerading as legitimate traffic

A

Which of the following devices is computer software, firmware, or hardware that creates and runs virtual machines? A.)Hypervisor B.)Virtual firewall C.)Virtual router D.)Virtual switch

A

Which of the following is a characteristic of TACACS+? A.)Encrypts the entire packets, not just authentication packets B.)Requires that authentication and authorization are combined in a single server C.)Uses UDP ports 1812 and 1813 D.)Supports only TCP/IP

A

Which of the following is not true regarding cloud computing? A.)Cloud computing requires end user to have knowledge of the physical location and configuration of the system that delivers the services. B.)Typical cloud computing providers deliver common business applications online that are accessed from another web service of software like a web browser. C.)Cloud computing is software, data access, computation, and storage services provided to clients through the internet. D.)The term cloud is used as a metaphor for the internet.

A

Which of the following types of penetration test teams will provide you information that is most revealing of a real-world hacker attack? A.)Zero-knowledge team B.)Partial-knowledge team C.)Split-knowledge team D.)Full-knowledge team

A

You can use a variety of methods to manage the configuration of a network router. Choose the management option for it corresponding description. -SSH A.)Uses public-key cryptography B.)Transfers data in cleartext C.)Cannot be sniffed

A

You can use a variety of methods to manage the configuration of a network router. Choose the management option for it corresponding description. -SSL A.)Uses public-key cryptography B.)Transfers data in cleartext C.)Cannot be sniffed

A

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device that is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router. When you run the software, you see frames addressed to the four workstations, but not to the router. Which feature should you configure? A.)Mirroring B.)Promiscuous mode C.)Spanning tree D.)Bonding

A

You have recently reconfigured FTP to require encryption of both passwords and data transfers. You would like to check network traffic to verify that all FTP passwords and data are encrypted. Which tool should you use? A.)Protocol analyzer B.)Performance monitor C.)Systems monitor D.)Vulnerability scanner

A

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement? A.)VLANs B.)DMZ C.)Port authentication D.)NAT

A

You manage a network that uses multiple switches. You want to provide multiple paths between switches so that if one link goes down, an alternate path is available. Which feature should you switch support? A.)Spanning tree B.)PoE C.)Mirroring D.)Trunking E.)OSPF

A

You want to identify traffic that is generated and sent through the network by a specific application running on a device. Which tool should you see? A.)Protocol analyzer B.)TDR C.)Multimeter D.)Certifier E.)Toner probe

A

You want to know which protocols are being used on your network. You'd like to monitor network traffic and sort traffic by protocol. Which should you use? A.)Packet sniffer B.)IPS C.)IDS D.)Throughput tester E.)Port scanner

A

Your LDAP directory services solution uses simple authentication. What should you always do when using simple authentication? A.)SSL B.)Use IPsec and certificates C.)Add SASL and use TLS D.)Use Kerberos

A

Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstation they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems. Which of the following is the most important aspect of maintaining network security against this type of attack? A.)User education and training B.)Identifying inherent vulnerabilities C.)Network segmentation D.)Documenting all network assets in your organization E.)Identifying a network baseline

A

Your organization's security policy specifies that peer-to-peer file sharing is not allowed. Recently, you received an anonymous tip that an employee has been using a BitTorrent client to download copyrighted media while at work. You research BitTorrent and find that it uses TCP ports 6881-6889 by default. When you check your perimeter firewall configuration, only ports 80 and 443 are open. When you check your firewall logs, you find that no network traffic using ports 6881-6889 has been blocked. What should you do? A.)Implement an application control solution B.)Call Human Resources and have the employee fired for violation of the security policy. C.)Block all outbound ports in the perimeter firewall. D.)Determine that the accused employee is innocent and being framed.

A

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using Telnet client with a user name admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? (Select two.) A.)Use an SSH client to access the router configuration. B.)Change the default administrative users name and password. C.)Use encrypted type 7 passwords. D.)Use a web browser to access the router configuration using an HTTP connection. E.)Use TFTP to back up the router configuration to a remote location.

A and B

Which of the following activities are typically associated with a penetration test? (Select two.) A.)Attempting social engineering B.)Running a vulnerability scanner on network servers C.)Interviewing employees to verify that the security policy is being followed D.)Running a port scanner E.)Creating a performance baseline

A and D

KWalletManager is a Linux-based credential management system that stores encrypted account credentials for network resources. Which encryption methods can KWalletManager use to secure account credentials? (Select two.) A.)Blowfish B.)Twofish C.)HMAC-SHA1 D.)Kerberos E.)GPG

A and E

Which of the following are security devices that perform stateful inspection of packet data and look for pattern that indicate malicious code? (Select two.) A.)IPS B.)ACL C.)VPN D.)Firewall E.)IDS

A and E

A honeypot is used for which purpose? A.)To prevent sensitive data from being accessed B.)To delay intruders in order to gather auditing data C.)To disable an intruder's system D.)to entrap intruders

B

A user has just authenticated using Kerberos. Which object is issued is to the user immediately following login? A.)Client-to-server ticket B.)Ticket granting ticket C.)Digital certificate D.)Digital signature

B

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions? A.)Impersonation B.)Privilege escalation C.)Social engineering D.)Replay

B

As a security professional, you need to understand your network on multiple levels. You should focus on the following areas: *Entry points *Inherent vulnerabilities *Documentation *Network baseline Choose the area of focus for the example listed below: -Used to identify a weak network architecture or design. A.)Inherent vulnerabilities B.)Documentation C.)Entry points D.)Network baseline

B

Choose the appropriate cloud technology for the description below: -Provides cloud services to a single organization. A.)Public cloud B.)Private cloud C.)Community cloud D.)Hybrid cloud

B

Select the network attack technique for the example listed. -Unauthorized individuals try to breach a network from off-site. A.)Active attack B.)External attack C.)Passive attack

B

Select the penetration test name for the penetration characteristic listed below: -The tester has the same amount of information that would be available to a typical insider in the organization. A.)White box test B.)Grey box test C.)Black box test D.)Single blind test E.)Double blind test

B

Select the software-defined networking (SDN) layer for the function listed below: -On this layer, individual networking devices use southbound APIs to communicate with the control plane. A.)Control layer B.)Physical layer C.)Application layer

B

Select the switch attack type for the description below: -Should be disabled on the switch's end user (access) ports before implementing the switch configuration into the network. A.)ARP Spoofing/Poisoning B.)Dynamic Trunking Protocol C.)MAC Flooding D.)MAC Spoofing

B

What common design feature among instant messaging clients make them less secure than other means of communicating over the internet? A.)Transfer of text and files B.)Peer-to-peer networking C.)Freely available for use D.)Real-time communication

B

What is mutual authentication? A.)The use of two or more authentication factors. B.)A process by which each party in an online communication verifies the identify of each other party. C.)Deploying CHAP and EAP on remote access connections. D.)Using a CA (Certificate authority) to issue certificates.

B

Which of the following describes the worst possible action by an IDS? A.)The system identified harmless traffic as offensive and generated an alarm. B.)The system identified harmful traffic as harmless and allowed it to pass without generating any alerts. C.)The system correctly deemed harmless traffic as inoffensive and let it pass. D.)The system detected a valid attack and the appropriate alarms and notifications were generated.

B

Which of the following identifies an operating system or network service based on its response to ICMP messages? A.)Port scanning B.)Fingerprinting C.)Social engineering D.)Firewalking

B

Which of the following ports are used with TACACS? A.)22 B.)49 C.)50 and 51 D.)1812 and 1813 E.)3389

B

Which protocol should you disable on the user access ports of a switch? A.)TCP B.)DTP C.)PPTP D.)IPsec

B

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attacks, if possible. Which tool should you use? A.)Packet sniffer B.)IPS C.)IDS D.)Port scanner

B

You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user traffic for a period of time to discover user behaviors and log violations for later review. How should you configure the application control software to handle applications not contained in the whitelist? A.)Block B.)Flag C.)Drop D.)Tarpit

B

You can use a variety of methods to manage the configuration of a network router. Choose the management option for it corresponding description. -HTTP A.)Uses public-key cryptography B.)Transfers data in cleartext C.)Cannot be sniffed

B

You can use a variety of methods to manage the configuration of a network router. Choose the management option for it corresponding description. -Telnet A.)Uses public-key cryptography B.)Transfers data in cleartext C.)Cannot be sniffed

B

You have a small network of devices connected using a switch. You want to capture the traffic that is sent from Host A to Host B. On Host C, you installed a packet sniffer that captures network traffic. After running the packet the sniffer, you cannot find any captured packets between Host A and Host B. What should you do? A.)Connect hosts A and B together on the same switch port through a hub B.)Configure port mirroring C.)Configure the default gateway address on hosts A and B with the IP address of Host C D.)Manually set the MAC address of Host C to the MAC address of Host A

B

You have opted to use software-defined networking (SDN) to manage, control, and make changes to your network. You want to be able to use software to configure and intelligently control the network, rather than relying on the individual static configuration files that are located on each network device. SDN consists of three layers: *Application layer *Control layer *Physical layer Which of the following describes what the SDN control layer does to networking devices that comprise the physical layer? A.)The control layer uses southbound APIs to communicate with the control plane in each networking device and creates a single control plane. B.)The control layer removes the control plane from networking devices and creates a single control plane. C.)The control layer layer removes the control plane from networking devices and creates a virtual control plane for each device. D.)The control layer interfaces with the control plane in each networking device and creates a virtual control plane.

B

You want to identify all devices on a network along with a list of open ports on those devices. You want the results displayed in a graphical diagram. Which tool should you use? A.)OVAL B.)Network mapper C.)Port scanner D.)Ping scanner

B

You want to make that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use? A.)IPS B.)Port scanner C.)Packet sniffer D.)System logs E.)IDS

B

You want to use a tool to see packets on a network, including the source and destination of each packet. Which tool should you use? A.)OVAL B.)Wireshark C.)Nessus D.)Nmap

B

You want to use a vulnerability scanner to check a system for known security risks. What should you do first? A.)Inform senior management of your actions B.)Update the scanner definition files C.)Perform a port scan D.)Apply all known patches to the system

B

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with the user name admin01 and the password P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device? A.)Use a Telnet client to access the router configuration. B.)Move the router to a secure server room. C.)Use encrypted type 7 passwords. D.)Use TFTP to back up the router configuration to a remote location. E.)Change the default administrative user name and password.

B

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a locked server closet. You use an FTP client to regularly back up the router configuration to a remote server in an encrypted file. You access the router configuration interface from a notebook computer that is connected to the router's console port. You've configured the device with the user name admin01 and the password P@ssW0rd. you have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of the device? A.)Move the router to a secure data center. B.)Use SCP to back up the router configuration to a remote location. C.)Use encrypted type 7 passwords. D.)Use an SSH client to access the router configuration.

B

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You configured the management interface with a user name admin and a password of password. What should you do to increase the security of this device? A.)Move the device to a secure data center. B.)Use a stronger administrative password. C.)Use a web browser to access the router configuration using an HTTP connection. D.)Use an SSH client to access the router configuration.

B

Your company is a small start-up company that has leased office space in a building shared by other businesses. All business share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented? A.)Port security B.)VLAN C.)VPN D.)Spanning tree

B

Your network devices are categorized into the following zone types: *No-trust zone *Low-trusted zone *Medium-trusted zone *High-trust zone Your network architecture employs multiple VLANs for each of these network zones. Each zone is separated by a firewall that ensures only specific traffic is allowed. Which of the following is the secure architecture concept that is being used on this network? A.)Trust zone networking B.)Network segmentation C.)Network firewalling D.)Virtual local area networking

B

Which actions can a typical is passive intrusion detection system (IDS) take when it detects an attack? (Select two.) A.)The IDS configuration is changed dynamically, and the source IP address is banned. B.)The IDS logs all pertinent data about the intrusion. C.)An alert is generated and delivered via email, the console, or an SNMP trap. D.)LAN-side clients are halted and removed from the domain.

B and C

Which of the following are included in an operations penetration test? (Select two.) A.)Duplicating captured packets without altering or interfering with the flow of traffic on that medium. B.)Eavesdropping or obtaining sensitive information from items that are not properly stored. C.)Looking through discarded papers or media for sensitive information. D.)Scanning various ports on remote hosts looking for well-known services. E.)Sneaking into a building without authorization.

B and C

Which of the following functions can a port scanner provide? (Select two.) A.)Auditing IPsec encryption algorithm configuration B.)Determining which ports are open on a firewall C.)Discovering an unadvertised servers D.)Testing virus definition design for false positives

B and C

You are configuring a dial-up connection to a remote access server. Which protocols would you choose to establish the connection and authentication, providing the most secure connection possible? (Select two.) A.)PAP B.)PPP C.)CHAP D.)SLIP E.)PPPoE

B and C

Which of the following are performed by the Microsoft Baseline Security Analyzer (MBSA) tool? (Select three.) A.)Gather performance statistics for setting a baseline B.)Check for open ports C.)Check for missing patches D.)Analyzer packets for evidence of an attack E.)Check user accounts for weak passwords

B, C, and E

A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try to determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario? A.)Active fingerprinting B.)Firewalking C.)Passive fingerprinting D.)Network enumeration

C

As a security professional, you need to understand your network on multiple levels. You should focus on the following areas: *Entry points *Inherent vulnerabilities *Documentation *Network baseline Choose the area of focus for the example listed below: -Public-facing servers, workstation, Wi-Fi networks, and personal devices. A.)Inherent vulnerabilities B.)Documentation C.)Entry points D.)Network baseline

C

CHAP performs which of the following security functions? A.)Allows the use of biometric devices B.)Protects user names C.)Periodically verifies the identify of a peer using a three-way handshake D.)Links remote systems together

C

Choose the appropriate cloud technology for the description below: -Allows cloud services to be shared by several organization. A.)Public cloud B.)Private cloud C.)Community cloud D.)Hybrid cloud

C

Network engineers have the option of using software to configure and intelligently control the network rather than relying on the individual static configuration files that are located on each network device. Which of the following is a relatively new technology that allows network and security professionals to use software to manage, control, and make changes to a network? A.)Load balancing software B.)Control layer networking C.)Software-defined networking D.)Infrastructure software networking

C

Network-based intrusion detection is most suited to detect and prevent which types of attacks? A.)Application implementation flaw B.)Brute force password attack C.)Bandwidth-based denial of service D.)Buffer overflow exploitation of software

C

Select the network attack technique for the example listed. -Attempting to gather information without affecting the flow of information on the network. A.)Active attack B.)External attack C.)Passive attack

C

Select the network attack technique for the example listed. -Sniffing network packets or performing a port scan. A.)Active attack B.)External attack C.)Passive attack

C

Select the penetration test name for the penetration characteristic listed below: -The tester has no prior knowledge of the target system. A.)White box test B.)Grey box test C.)Black box test D.)Single blind test E.)Double blind test

C

Select the software-defined networking (SDN) layer for the function listed below: -This layer communicates with the control layer through what's called the northbound interface. A.)Control layer B.)Physical layer C.)Application layer

C

Select the switch attack type for the description below: -Causes packets to fill up the forwarding table and consumes so much of the switch's memory that it enters a state called fail open mode. A.)ARP Spoofing/Poisoning B.)Dynamic Trunking Protocol C.)MAC Flooding D.)MAC Spoofing

C

The IT manager has asked you to create a separate VLAN to be used exclusively for wireless guest devices to connect to. Which of the following is the primary benefit of creating this VLAN? A.)You can control broadcast traffic and create a collision domain for just the wireless guest devices. B.)You can load-balance wireless guest network traffic to have a lower priority than the rest of the traffic on the network. C.)You can control security by isolating wireless guest devices within this VLAN. D.)You can create a wireless guest network more affordably with a VLAN than you can with a router.

C

What type of attack is most likely to succeed with communications between instant messaging clients? A.)DNS poisoning B.)Denial of service C.)Sniffing D.)Brute force password attack

C

When configuring VLANs on a switch, what is used to identify which VLAN a device belongs to? A.)IP address B.)MAC address C.)Switch port D.)Host name

C

When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch? A.)Gigabit and higher Ethernet ports B.)Any port not assigned to a VLAN C.)Trunk ports D.)Uplink ports E.)Each port can only be a member of a single VLAN

C

Which of the following cloud computing solutions delivers software applications to a client either over the internet of on a local area network? A.)DaaS B.)IaaS C.)SaaS D.)PaaS

C

Which of the following devices facilitates communication between different virtual machines by checking data packets before moving them to a destination? A.)Virtual firewall B.)Hypervisor C.)Virtual switch D.)Virtual router

C

Which of the following is a disadvantage of software-defined networking (SDN)? A.)SDN creates centralized management. B.)SDN facilitates communication between hardware from different vendors. C.)SDN standards are still being developed. D.)SDN gather network information and statistics.

C

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP? A.)Hashed shared secret B.)Certificate-based authentication C.)Mutual authentication D.)Three-way handshake

C

Which of the following is the best example of remote access authentication? A.)A user accesses a shared folder on a server B.)A user connects to a computer on the LAN using Remote Desktop. C.)A user establishes a dial-up connection to a server to gain access to shared resources. D.)A user logs on to an e-commerce site that use SSL.

C

Which of the following protocols can be used to centralized remote access authentication? A.)CHAP B.)Kerberos C.)TACACS D.)EAP E.)SESAME

C

Which of the following solutions would you implement to eliminate switching loops? A.)Auto-duplex B.)CSMA/CD C.)Spanning tree D.)Inter-vlan routing

C

Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices? A.)MAC spoofing B.)DNS poisoning C.)ARP spoofing/Poisoning D.)Cross-site scripting

C

Which of the following uses hacking techniques to proactively discover internal vulnerabilities? A.)Inbound scanning B.)Passive reconnaissance C.)Penetration testing D.)Reverse engineering

C

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the firewall. Which tool should you use? A.)Event log B.)Throughput tester C.)Packet sniffer D.)System log E.)Load tester

C

You can use a variety of methods to manage the configuration of a network router. Choose the management option for it corresponding description. -Console port A.)Uses public-key cryptography B.)Transfers data in cleartext C.)Cannot be sniffed

C

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device, which is connected to the same hub that is connected to the router. When you run the software, you only see frames addressed to the workstation, not to other devices. Which feature should you configure? A.)Mirroring B.)Bonding C.)Promiscuous mode D.)Spanning tree

C

You have decided to perform a double-blind penetration test. Which of the following actions would you perform first? A.)Run system fingerprinting software B.)Perform operational reconnaissance C.)Inform senior management D.)Engage in social engineering

C

You manage a network that uses switches. In the lobby of building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure? A.)VLANs B.)Mirroring C.)Port authentication D.)Bonding E.)Spanning tree

C

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches? A.)Trunking B.)PoE C.)Spanning tree D.)Bonding E.)802.1x

C

You notice that over the last few months more and more static systems, such as the office environment control system, the security system, and lighting controls, are connecting to your network. You know that these devices can be security threat. Which of the following measures can you take to minimize the damage these devices can cause if they are compromised? A.)Create a VLAN to use as a medium-trust network zone for these static systems to connect to. B.)Create VLAN to use as a high-trust network zone for these static systems to connect to. C.)Create a VLAN to use as a low-trust network zone for these static systems to connect to. D.)Create VLAN to use as a no-trust network zone for these static systems to connect to.

C

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files. You want the connection to be as secure as possible. Which type of connection will you need? A.)Virtual private network B.)Internet C.)Remote access D.)Intranet

C

Which of the following activities are considered passive in regards to the function of an intrusion detection system? (Choose two.) A.)Disconnecting a port being used by a zombie B.)Transmitting FIN or RES packets to an external host C.)Listening to network traffic D.)Monitoring the audit trails on a server

C and D

Which of the following are characteristics of TACACS+? (Select two.) A.)Allows of two different servers, one for authentication and authorization, and another for accounting B.)Uses UDP C.)Allows three different servers, one each authentication, authorization, and accounting D.)Uses TCP

C and D

Which of the following are true concerning the Virtual Desktop Infrastructure (VDI)? (Select two.) A.)In the event of a widespread malware infection, the administrator can reimage user desktops by pushing an image out to each user desktop system over the network. B.)User desktop environments are provided by individual desktop systems instead of by remote servers. C.)User desktop environments are centrally hosted on servers instead of on individual desktop systems. D.)In the event of a widespread malware infection, the administrator can quickly reimage all user desktops on a few central servers. E.)Roaming profiles must be configured to allow mobile users to keep their same desktop environment across systems.

C and D

You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an application that was developed in-house to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, all of testing virtual machines do not have a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do? (Select two.) A.)Create a new virtual switch configured for host-only networking B.)Disable the switch port that the hypervisor's network interface is connected to. C.)Create a new virtual switch configured for bridged (external) networking. D.)Connect the virtual network interfaces in the virtual machines to the virtual switch.

C and D

You want to use a tool to scan a system for vulnerabilities, including open ports, running services, and missing patches. Which tools should you use? (Select two.) A.)OVAL B.)LC4 C.)Nessus D.)Retina E.)Retina F.)Wireshark

C and D

Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two.) A.)AAA B.)EAP C.)RADIUS D.)802.1x E.)TACACS+ F.)PKI

C and E

Which of the following are requirements to deploy Kerberos on a network? (Select two.) A.)Use if token devices and one-time passwords B.)A directory service C.)A centralized database of users and passwords D.)Blocking of remote connectivity E.)Time synchronization between devices

C and E

A manger has told you she is concerned about her employees writing their passwords for websites, network files, and database resources on sticky notes. Your office runs exclusively in a Windows environment. Which tool could you use to prevent this behavior? A.)Local Users and Groups B.)Key Management Serive C.)Computer Management D.)Credential Manager

D

A relatively new employee in the data entry cubical farm was assigned a user account similar to the data entry employee's accounts. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred? A.)Smurf attack B.)Social engineering C.)Man-in-the-middle attack D.)Privilege escalation

D

A security administrator is conducting a penetration test on a network. She connects a note book running Linux to the wireless network and then uses NMAP to probe various network hosts to see which operating systems they are running. Which process did the administrator use in the penetration test in this scenario? A.)Network enumeration B.)Passive fingerprinting C.)Firewalking D.)Active fingerprinting

D

A security administrator needs to run a vulnerability scan that will analyze a system from the perspective of a hacker attacking the organization from the outside. What type of scan should he use? A.)Network mapping scan B.)Credentialed scan C.)Port scan D.)Non-credentialed scan

D

As a security professional, you need to understand your network on multiple levels. You should focus on the following areas: *Entry points *Inherent vulnerabilities *Documentation *Network baseline Choose the area of focus for the example listed below: -What activity looks like in normal day-to-day usage A.)Inherent vulnerabilities B.)Documentation C.)Entry points D.)Network baseline

D

Choose the appropriate cloud technology for the description below: -Integrates one cloud service with other cloud services. A.)Public cloud B.)Private cloud C.)Community cloud D.)Hybrid cloud

D

Instant messaging does not provide which of the following? A.)Ease of file transfers B.)Real-time communications C.)Indication of when you are online D.)Privacy

D

Select the penetration test name for the penetration characteristic listed below: -Either the attacker has prior knowledge about the target system, or the administrator knows that the test is being performed. A.)White box test B.)Grey box test C.)Black box test D.)Single blind test E.)Double blind test

D

Select the switch attack type for the description below: -Can be used to hide the identify of the attacker's computer or impersonate another device on the network. A.)ARP Spoofing/Poisoning B.)Dynamic Trunking Protocol C.)MAC Flooding D.)MAC Spoofing

D

Which is a typical goal of MAC spoofing? A.)Rerouting local switch traffic to a specified destination B.)Causing a switch to enter fail open mode C.)Causing incoming packets to broadcast to all ports D.)Bypassing 802.1x port-based security

D

Which of the following are differences between RADIUS and TACACS+? A.)RADIUS encrypts the entire packet contents; TACACS+ only encrypts the password. B.)RADIUS supports more protocol than TACACS+. C.)RADIUS uses TCP; TACACS+ uses UDP. D.)RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

D

Which of the following authentication protocols transmits password in cleartext, and is, therefore, considered too insecure for modern networks? A.)RADIUS B.)EAP C.)CHAP D.)PAP

D

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model? A.)PaaS delivers software applications to the client either over the internet or on a local are network. B.)PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. C.)PaaS stores and provides data from a centralized location without the need for local collection and storage. D.)PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

D

Which of the following best describes the concept of a virtual LAN? A.)Device in separate network (i.e. different network addresses) logically grouped as if they were in the same network B.)Device connected through the Internet that can communicate without using a network address C.)Devices on different networks that can receive multicast packets D.)Devices on the same network logically grouped as if they were on a separate networks E.)Device connected by a transmission medium other than cable (i.e. microwave, radio transmissions)

D

Which of the following can make passwords useless on a router? A.)Using the MD5 hashing algorithm to encrypt the password B.)Using SSH to connect to a router remotely C.)Storing the router configuration file to a secure location D.)Not controlling physical access to the router

D

Which of the following devices is capable of detecting and responding to security threats? A.)IDS B.)DNS server C.)Multi-layer switch D.)IPS

D

Which of the following identifies standards and XML formats for reporting and analyzing system vulnerabilities? A.)OSSTMM B.)MBSA C.)Retina D.)OVAL

D

Which of the following is an appropriate definition of a VLAN? A.)A physical collection of devices that belong together and are connected to the same wire or physical switch. B.)A device used to route traffic between separate networks. C.)A device used to filter WAN traffic. D.)A logical grouping of devices based on service need, protocol, or other criteria.

D

Which of the following is the type of port scan that does not complete the full three-way TCP handshake, but rather listens only for either SYN/ACK or RST/ACK packets? A.)TCP ACK scan B.)TCP FIN scan C.)TCP connect scan D.)TCP SYN scan

D

Which remote access authentication protocol periodically and transparently re-authenticates during a logon session by default? A.)PAP B.)EAP C.)Certificates D.)CHAP

D

While developing a network application, a programmer adds functionally that allows her to access the running program without authentication so she can capture debugging data. The programmer forgets to remove this functionality prior to finalizing the code and shipping the application. What type of security weakness does this represent? A.)Buffer overflow B.)Privilege escalation C.)Weak passwords D.)Backdoor

D

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computer has been difficult. You've have problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet. The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the Internet. What can you do? A.)Remove the hub and place each library computers on its own access port. B.)Create a VLAN for each group of four computers. C.)Create static MAC addresses for each computer and associate it with a VLAN. D.)Configure port security on the switch.

D

You have a network with three remote access servers, a RADIUS server used for authentication and authorization, and a second RADIUS server used for accounting. Where should you configure remote access policies? A.)On one of the remote access servers B.)On each of the remote access servers C.)On the RADIUS server used for accounting D.)On the RADIUS server used for authentication and authorization

D

You have configured an NIDS to monitor network traffic. Which of the following describes harmless traffic that has been identified as a potential attack by the NIDS device? A.)Positive B.)False negative C.)Negative D.)False positive

D

You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation? A.)VPN B.)Spanning tree C.)Port security D.)VLAN

D

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need? A.)Network mapper B.)Protocol analyzer C.)Port scanner D.)Vulnerability scanner

D

You want to check a server for user accounts that have weak passwords. Which tool should you use? A.)Nessus B.)OVAL C.)Retina D.)John the Ripper

D

You want to increase the security of your network by allowing authenticated users to access network devices through a switch. Which of the following should you implement? A.)Spanning tree B.)Port security C.)IPsec D.)802.1x

D

You want to use Kerberos to protect LDAP authentication. Which authentication mode should you choose? A.)Simple B.)Mutual C.)EAP D.)SASL

D

You've just deployed a new Cisco router so you can connect a new segment to your organization's network. The router is physically located in a server room that can only be accessed with an ID card. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer by connecting it to the console port on the router. The web-based management interface uses the default user name of cusadmin and a password of highspeed. What should you do to increase the security of this device? A.)Create a more complex password. B.)Change the user name. C.)Remove any backdoors that might have been created by a programmer. D.)Change the user name and create a more complex password.

D

Which of the following applications typically use 802.1x authentication? (Select two.) A.)Authenticating VPN users through the Internet B.)Authenticating remote access clients C.)Controlling access through a router D.)Controlling access through a wireless access point E.)Controlling access through a switch

D and E

Select the penetration test name for the penetration characteristic listed below: -The tester does not have prior information about the system and the administrator has no knowledge that the test is being performed. A.)White box test B.)Grey box test C.)Black box test D.)Single blind test E.)Double blind test

E

Which of the following is NOT an administrative benefit of implementing VLANs? A.)You can manually load-balance network traffic. B.)You can simplify device moves. C.)You can control security by isolating traffic within a VLAN. D.)You can control broadcast traffic and create collision domains based on logical criteria. E.)You can simplify routing traffic between separate networks.

E

Which of the following protocols uses port 88? A.)L2TP B.)TACACS C.)PPTP D.)LDAP E.)Kerberos

E

You are using a vulnerability scanner that conforms to the OVAL specifications. Which of the following items contains a specific vulnerability or security issue that could be present on a system? A.)Threat agent B.)Repository C.)Library D.)Asset risk E.)Definition

E

You want to deploy SSL to protect authentication traffic with your LDAP-based directory service. Which port does this action use? A.)60 B.)80 C.)389 D.)443 E.)636 F.)2208

E

Your organization uses a web server to host an e-commerce site. Because this web server handles financial transactions, you are concerned that it could become a prime target for exploits. You want to implement a network security control that will analyze the contents of each packet going to or from the web server. The security control must be able identify malicious payloads and block them. What should you do? A.)Install an anti-malware scanner on the web server B.)Implement a stateful firewall in front of the web server C.)Implement an application-aware IDS in front of the web server D.)Implement a packet-filtering firewall in front of the web server E.)Implement an application-aware IPS in front of the web server

E

You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems versions and editions. Currently, all of your testing virtual machines' are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. to prevent issues, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two.) A.)Disconnect the network cable from the hypervisor's network interface. B.)Create MAC address filters on the network switch that block each virtual machine's virtual netwrok interfaces. C.)Disable the switch port they hypervisor's network interface is connected to. D.)Create a new virtual switch configured for bridged (external) networking. E.)Create a new virtual switch configured for host-only (internal) networking. F.)Connect the virtual network interface in the virtual machines to the virtual switch.

E and F


Set pelajaran terkait

WEEK 1 & 2: The Shape of the Oceans

View Set

Chapter 2 "Organizing and Summarizing Data"

View Set

Chapter 39: Pediatric Variations of Nursing Interventions QUESTIONS

View Set