IT Test Practice

Ace your homework & exams now with Quizwiz!

When designing a firewall solution, what is the recommended approach for incoming and outgoing ports? Responses A Close all ports;open only ports required by applications inside the network B Close all ports;only open ports 20, 21, 53, 80 and 443 C Open all ports; close ports that expose common network attacks D Close all ports E Open all ports; close ports that show improper traffic or attacks in progress

A

Which of the following NAC agent types would be used for IoT devices? Responses A Agentless B Zero-trust C Dissolvable D Permanent

Agentless

Place the steps in the NAC implementation process in order from start to finish. not all options are used. Plan, Define, Review/Test, Apply

PDAR

Which of the following defines all the prerequisites a device must meet in order to access a network? Responses A Authorization B Zero-trust security D Authentication E Identity Services Engine

A

Out of the choices listed, which are characteristics of basic packet filtering (stateless) firewall? Select two choices Responses A filters IP address and port B Stateless C filters based on URL D Stateful filters based on sessions

A, B

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from internet-based attacks. Which solution should you use? (Select three) Responses A Source address of a packet B Checksum C Digital signature D Port number E Destination address of the packet F Sequence number G Acknowledgement number

A, B, C

Which of the following defines all the prerequisites a device must meet in order to access a network? Responses A Authorization B Zero-trust security C Identity Services Engine D Authentication

Authentication

Which of the following happens by default when you create and apply a new ACL on a router? Responses A the ACL is ignored until it is applied B all traffic is permitted C all traffic is blocked D ACLs are not created on routers

B

Which of the following options best describes a stateful inspection? Responses A offers secure connectivity between many entities and uses encryption to provide an effective defense against sniffing attacks B determines the legitimacy of traffic based on the state of the connection, from which traffic originated C allows all internal traffic to share a single public IP address when connecting to an outside network D designed to sit between a host and web server and communicate with the server on behalf of the host

B

Which statement describes agentless antivirus protection? Responses A antivirus is provided by the ISP B antivirus scans are performed on hosts from a centralized system C antivirus protection is provided by the router that is connected to a cloud service D host based antivirus systems provide agentless AV protection

B

You are deploying a new router at an enterprise location. After you change the factory default settings, what is a good next step? Responses A update the firmware B secure the configuration file C configure anti-spoofing rules D configure SSH to access the router configuration

B

Out of the choices listed, which are characteristics of basic packet filtering firewall? Select two choices Responses A filters based on sessions B filters IP address and port C filters based on URL D Stateful E Stateless

B, E

An attacker was able to gain unauthorized access to a mobile phone and install a Trojan horse so that he or she could bypass security controls and reconnect later. Responses A Replay B Social engineering C Backdoor D Privilege escalation

C

Which device in a LAN infrastructure is suspecptible to MAC address overflow and spoofing attacks? Responses A router B workstation C switch D firewall

C

Which of the following NAC agent types would be used for IoT devices? Responses A Permanent B Dissolvable C Agentless D Zero-trust

C

In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location? Responses A IPS/IDS B safe browsing C anti phishing D telemetry

D

What is a host-based intrusion detection system (HIDS)? Responses A it identifies potential attacks and sends alerts but cannot stop traffic B it is an agentless system that scans files on a host for potential malware C it detects and can stop potential direct attacks but does not scan for malware D it combines the capabilities of antimalware applications with firewall applications

D

Which of the following happens by default when you create and apply a new ACL on a router? Responses A all traffic is blocked B all traffic is permitted C the ACL is ignored until it is applied D ACLs are not created on routers

all traffic is blocked

Which of the following options best describes a stateful inspection? Responses A allows all internal traffic to share a single public IP address when connecting to an outside network B determines the legitimacy of traffic based on the state of the connection, from which traffic originated C designed to sit between a host and web server and communicate with the server on behalf of the host D offers secure connectivity between many entities and uses encryption to provide an effective defense against sniffing attacks

determines the legitimacy of traffic based on the state of the connection, from which traffic originated

Which statement describes agentless antivirus protection? Responses A antivirus protection is provided by the router that is connected to a cloud service B antivirus scans are performed on hosts from a centralized system C antivirus is provided by the ISP D host based antivirus systems provide agentless AV protection

host based antivirus systems provide agentless AV protection

What is a host-based intrusion detection system (HIDS)? Responses A it identifies potential attacks and sends alerts but cannot stop traffic B it detects and can stop potential direct attacks but does not scan for malware C it is an agentless system that scans files on a host for potential malware D it combines the capabilities of antimalware applications with firewall applications

it combines the capabilities of antimalware applications with firewall applications

Which antimalware software approach can recognize various characteristics of known malware files to detect a threat? routing-based behavior-based signature-based heuristics-based

signature-based


Related study sets

physics electricity questions part 2

View Set

Forensics Crime Scene Evaluation

View Set

Secondary Education: Gallaudet University

View Set

Intro to Sociology Chapters 10-12

View Set

NUR208 EAQ 1: Health and Maintenance

View Set

Abdominal Sonography CTL: Pathology 42% Pt 3

View Set

Chapter 7 bank collections, trade finance, letter of credit

View Set