Chapter 10,11

Ace your homework & exams now with Quizwiz!

Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so? A WLAN consumer attack, because many users fail to properly configure security on their home WLANs. A disassociation attack, because the device gets disconnected from the network and can be hacked easily.Analysis A WDoS attack, because WLANs are less secure and can easily be hacked. A jamming attack, because this attack can be achieved using mobile phone networks.

A WLAN consumer attack, because many users fail to properly configure security on their home WLANs.

Which of the following statements correctly defines jamming? An attacker intentionally floods the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications. An attacker tries to mimic an authorized AP, so a user's mobile device such as a laptop or tablet unknowingly connects to the evil twin instead. An attacker circumvents the security protections in the company's network, accessing the network behind the firewall. An attacker creates false deauthentication or disassociation management frames that appear to come from another client device, causing the client to disconnect from the AP.

An attacker intentionally floods the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications.

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files? FTP SFTP TFTP FTPS

FTPS

Which of the following can be achieved using availability zones in cloud computing? More visibility Less redundancy Lower cost Fault tolerance

Fault tolerance

Which of the following tools can be used to secure multiple VMs? Firewall Antivirus Firewall virtual appliance Intrusion detection system

Firewall virtual appliance

Which of the following protocol can be used for secure routing and switching? HTTPS DNSSEC HTTP IPsec

IPsec

Which of the following protocols can make accessing data using man-in-the-middle attacks difficult while web browsing? SFTP HTTP IPv6 DNSSEC

IPv6

Which of the following is the most versatile cloud model? XaaS SaaS PaaS IaaS

IaaS

John is instructed by his CEO to introduce an employee attendance system that replaces the current manual-sign register. The organization doesn't allow personal electronic devices into the premises.What method should John use for this system? Bluetooth RFID NFC WLAN network

RFID

Zain, a telecom engineer, plans to relocate a particular AP antenna to a new location. Which of the following configuration options will he use to adjust frequency bands, optimum channels, and available spectrum for data transfer? Spectrum selection Wi-Fi analyzers Signal strength settings Antenna placement

Spectrum selection

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be? Type I hypervisor Type II hypervisor Type III hypervisor Container

Type I hypervisor

You are a cloud administrator, and you are asked to configure a VPC such that backend servers are not publicly accessible. What should you do to achieve this goal? Implement audit logging on backend servers Deploy the backend servers on premises Deploy backend servers in different availability zones Use private subnets for backend servers

Use private subnets for backend servers

Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat? Use software-defined visibility Use a software-defined network Use virtual desktop infrastructure Implement subnetting

Use software-defined visibility

Your enterprise recently decided to hire new employees as work-from-home interns. For the new employees to work from home, you need to create a network that will allow them to securely access enterprise data from remote locations.Which technology should you use? SNMP VPN FTPS S/MIME

VPN

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device? Cellular IoT baseband Subscriber identity module Zigbee Narrowband IoT

Subscriber identity module

Which security protocol encrypts transmissions by using a shared secret key combined with an initialization vector (IV) that changes each time a packet is encrypted? WPA MAC WEP WPS

WEP

Sam is asked to help his company design a wireless network for their new location.Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices? WEP WPA2 WPA3 WPA

WPA3

Which site survey tool is used to visually represent wireless network details such as channel bandwidth, channel coverage, data rate, and interference, among others? Channel overlays Wi-Fi analyzers Channel selection Heat maps

Wi-Fi analyzers

In which of the following attacks, exemplified by jamming and RTS duration field attacks, do attackers use intentional interference to flood the RF spectrum with enough interference to prevent a device from effectively communicating with the AP? Evil twin Wireless denial of service attacks Intercepting wireless data Disassociation attack

Wireless denial of service attacks

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database? Dedicated probes Access point probe Desktop probe Wireless device probe

Wireless device probe

Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database? Dedicated probes Wireless device probe Desktop probe Access point probe

Wireless device probe

David is asked to test a new configuration on a virtual machine; if it does not work, it should roll back to the older state. What should David do before testing the new configuration so he can roll it back to the previous state if needed? Take a screenshot of the virtual machine before testing the configuration Enable "roll back" on the previous configuration before testing the new configuration Use sandboxing in the virtual machine before testing the configuration Take a snapshot of the virtual machine before loading the configuration

Take a snapshot of the virtual machine before loading the configuration

Why are jamming attacks generally rare? The transmitter is not very powerful and must be close to the target They can't identify WLAN RF signals from other device signals They require expensive, sophisticated equipment They can't get around new IEEE amendments that fully protect WLANs

They require expensive, sophisticated equipment

Which of the following differentiates an access point probe and a dedicated probe? A dedicated probe is a wireless adapter plugged into a desktop computer to monitor the RF in the area for transmissions. In contrast, an access probe is a standard wireless device that can be configured to act as a wireless probe. A dedicated probe only monitors RF transmissions, while an access point probe can serve as both a probe and an access point that can provide roaming to wireless users. A dedicated probe is a standard wireless device that can be configured to act as a wireless probe. In contrast, an access point probe is a wireless adapter plugged into a desktop computer to monitor the RF in the area for transmissions. A dedicated probe has the ability t to serve as both a probe and an access point that can provide roaming to wireless users. In contrast, an access point probe only monitors RF transmissions.

A dedicated probe only monitors RF transmissions, while an access point probe can serve as both a probe and an access point that can provide roaming to wireless users.

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection? Bluejacking Bluesnarfing NFC attack RFID attack

Bluesnarfing

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection.Which technology should Sherry suggest? RFID technology can be used to connect laptop mouse without any wired connection Bluetooth technology can be used to connect devices without any wired connection WLANs can be used to connect mobile devices to speakers NFC technology can be used to connect mobile devices to speakers

Bluetooth technology can be used to connect devices without any wired connection

Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must have a hands-free system where drivers can use voice controls to browse their phone's contact list, make and receive hands-free phone calls, mirror a smartphone screen on the LED dash display, and use navigation and entertainment apps.Which technology should he use and why? WLAN, because it can be connected to the car's internal computer system to provide internet and screen mirroring features. Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features. RFID devices, because they establish two-way communication between devices, which can be used to provide hands-free features with voice control. NFC, because it is used to transmit information between devices by a small tag that can help provide hands-free features and an internet connection.

Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features.

Which of the following best describes the cloud access security broker? CASB allows secure access to the data stored in the cloud from any device. CASB ensures the security policies of the enterprise extend to its data in the cloud. CASB secures the data stored in the cloud by restricting unauthorized access. CASB is a virtual alternative to a physical firewall.

CASB ensures the security policies of the enterprise extend to its data in the cloud.

Which of the following protects SNMP-managed devices from unauthorized access? X.500 lite Community string Resource records X.500

Community string

You are a security consultant. An enterprise client contacted you because their mail domain is blocked due to an unidentified entity using it to send spam. How should you advise them to prevent this from happening in the future? Configure the POP3 so that it listens on port 25 Configure the IMAP to store emails on the email server Configure the POP to monitor incoming and outgoing emails Configure the SMTP relay to limit relays to only local users

Configure the SMTP relay to limit relays to only local users

Which of the following is a virtualization instance that uses OS components for virtualization? Host OS VM escape protection Container Hypervisor

Container

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply? Containers use OS components for virtualization Containers use dedicated physical storage for virtualization Containers use hardware hypervisors for virtualization Containers use Type I hypervisors for virtualization

Containers use OS components for virtualization

What type of APs can be managed by wireless LAN controllers (WLCs)? Standalone APs Fat AP Captive portal APs Controller AP

Controller AP

Marnus is working as a cloud administrator, and he has been asked to perform segmentation on specific cloud networks. Which of the following should be done by Marnus? Remove individual accounts on file servers, machines, or authentication servers to restrict access and free up disc space, ports, and certificates. Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them. Use automated inspection and integration services for authentication, authorization, encryption,availability, and policy compliance. Create a virtual network that connects services and resources such as virtual machines and database applications.

Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users? Jamming Evil twin Rogue access point Wireless denial of service attacks

Evil twin

Under which vulnerability can an attacker steal information from a user's phone using a device to connect to the phone without physically touching it? Device theft Eavesdropping Data theft Man-in-the-middle

Data theft

Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves? Dedicated probe Wireless device probe Desktop probe Access point probe

Dedicated probe

Which of the following is a feature of secrets management? Data availability Default encryption Data redundancy Decreased latency

Default encryption

Which of the following packets contains the field that indicates the function of the packet and an identifier field used to match requests and responses and the type of data being transported along with the data itself? TKIP packet DHCP packet analysis CCMP packet EAP packet

EAP packet

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply? If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities. If the virtual machine's load increases, the virtual machines can balance the load by denying further access. If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced. If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.

If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

You are working as a cloud administrator, and are asked to migrate a virtual machine to a more capable physical machine, as the demand for the service hosted on the VM increased past its limit. As your enterprise still uses conventional switches, migration took time and resulted in customer dissatisfaction. How should you mitigate this issue in the future? Implement a software-defined network Use virtual desktop infrastructure Implement software-defined visibility Create containers in the virtual machine

Implement a software-defined network

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected? Deactivate the host OS while the guest OS is running Assign different virtual networks for the guest OS and host OS Implement a secure network gateway Implement virtual machine escape protection

Implement virtual machine escape protection

Zara has been instructed to organize an event where top companies will come and give a webinar. Since the event is large and the number of people attending is substantial, Zara needs to ensure that there are no disturbances. She thinks preventing devices from communicating and calls from being made or received is the easiest solution.Which factor should Zara use to achieve this? Rogue access point Evil twin Disassociation Jamming

Jamming

Which of the following protocols allows John to prevent unwanted network access, provide security, and be configured to permit traffic only from specific addresses ? WEP MAC WPS WPA

MAC

In an interview, you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered. Which of the following should be your reply? LDAP prevents unwanted mails from being delivered. Mail gateways prevent unwanted mails from being delivered. SMTP relays prevent unwanted mails from being delivered. X.500 prevents unwanted mails from being delivered.

Mail gateways prevent unwanted mails from being delivered.

Sherlin is the owner of a cosmetics store. She wanted to introduce a wireless network in the store, but her IT department was against it. Sherlin ended up purchasing an inexpensive wireless router and secretly connected it to the wired network. Unfortunately, this unknowingly provided open access to the wireless signal.What type of attack has Sherlin made her store's network vulnerable to? Jamming Wireless denial of service attacks Evil twin Rogue access point

Rogue access point

Which of the following protocols can be used for secure video and voice calling? S/MIME SNMP VPN SRTP

SRTP

Which of the following tools can be used to protect containers from attack? Security-Enhanced Linux Virtual machine manager Software-defined networking Software-defined visibility

Security-Enhanced Linux


Related study sets

Chapter 9 Inventories: Additional Issues SmartBook

View Set

كلمات أحمد أبوزيد

View Set

Practice Quiz #1 AND Practice Quiz #2

View Set

COMBO BLAW 2 ALL STUDY THE TRUE ONES

View Set

NR 206 Analyzing Data to Make Accurate Clinical Judgments

View Set