B.2.4 Network+ Domain 4: Network Security (20 random questions)
You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computer has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet.The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the Internet.What can you do?
configure port security on the switch
You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?
802.1x
A security administrator is conducting a penetration test on a network. She connects a notebooksystem running Linux to the wireless network and then uses NMAP to probe various networkhosts to see which operating system they are running.Which process did the administrator use in the penetration test in this scenario?
Active fingerprinting
What is the primary countermeasure to social engineering
Awareness
You are concerned that wireless access points may have been deployed within your organization without authorization. What should you do? (Select two. Each response is a complete solution.
Check the MAC addresses of devices connected to your wired switch conduct a site survey
Which of the following applications typically use 802.1x authentication? select two
Controlling access through a wireless access point Controlling access though a switch
Which of the following is an example of privilege escalation?
Creeping privileges
Match the network Access Protection (NAP) component on the left with is description on the right.
Generates a stament of Health (SoH) that reports the client configuration for health requirements. - NAP Client Runs the System Health Validator (SHV)program - NAP Server Is the connection point for clients to the network - Enforcement Server (ES) Contain resources accessible to non-compliant computers on the limited-access network. - Remediation Server
Which of the following is a common form of social engineering attack?
Hoax virus information e-mails
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted.You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur. What should you do?
Install a network virus detection software solution.
While using a Web-based order form, an attacker enters an unusually large volume in the quantity field. Which type of attack has occurred in this scenario?
Integer overflow
Which of the following is the most important thing to do to prevent console access to a network switch?
Keep the switch in a room that is locked by a keypad
Which of the following authentication methods uses tickets to provide single sign-on?
Kerberos
You are in the process of implementing a Network Access Protection (NAP) infrastructure to increase your networks security. You are currently configuring the remediation network that non-compliant clients will connect to in order to become compliant. the remediation network needs to be isolated from the secure network. Which should you implement to do this?
Network segmentation
You are configuring your computer to dial up to the internet. What protocol should you use?
PPP
A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario?
Passive fingerprinting
A network utilizes a network access control (NAC) solution to protect against malware.When a wired or wireless host tries to connect to the network, a NAC agent on the host checks itto make sure it has all of the latest operating system updates installed and that the latestantivirus definitions have been applied. What is this process called?
Posture assessment
A relatively new employee in the data entry cubical farm was assigned a user account similar to that of all the other data entry employees. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred?
Privilege escalation
You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: • When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. • The office manager informs you that the organization's servers are kept in a locked closet.Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. • She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. • You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. • You notice that a router/firewall/content You notice that a router/firewall/content filter all filter all-in-one device has been implemented in the one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client? (Select two.)
Relocate the switch to the locked server closet. Control access to the work area with locking doors and card readers.
What type of malware monitors your actions?
Spyware