12 - Network Security Flashcards

Question 12 has been omitted for redundancy. Analyze, assess, and implement appropriate tools to secure applications and mitigate network attacks

1
Q

What does an SSL stripping attack look for to perform an on-path attack?

A

An unencrypted HTTP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ben wants to observe malicious behavior targeted at multiple systems on a network. He sets up a variety of systems and instruments to allow him to capture copies of attack tools and to document all the attacks that are conducted. What attractant has he set up?

A

A Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Valerie wants to replace the telnet access that she found still in use in her org. Which protocol should she use to replace it, and what port will it run on?

A

SSH, on Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

James is concerned about preventing broadcast storms on his network. What are some useful solutions he can implement to prevent this?

A

Spanning Tree Protocols, Loop Prevention Features, and limited VLAN sizes can all reduce the potential for a broadcast storm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chuck wants to provide route security for his org, and he wants to secure the BGP traffic that his routers rely on for route information. What should Chuck do?

A

Unfortunately, BGP does not have native security methods. Two solutions (SIDR and RPLS) have not been broadly adopted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Connor believes that there is an issue between his org’s network and a remote web server, and he wants to verify this by checking each hop along the route. Which tool should he use if he is testing from a Windows 10 system?

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nick wants to display the ARP cache for a Windows system. What command should he run to display the cache?

A

arp /a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bart needs to asses whether a three-way TCP handshake is occurring between a Linux server and a Windows workstation. He believes that the workstation is sending a SYN but is not sure what’s occurring next. If he want to monitor traffic, and he knows that the Linux system doesn’t provide a GUI, what tool should he use to view the traffic from the workstation?

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocol is used to securely wrap many otherwise insecure protocols?

A

Transport Layer Security (TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bonita has discovered that her org is running a service on TCP port 636. What secure protocol is most likely in use?

A

LDAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Randy want to prevent DHCP attacks on his network. What secure protocol should he implement to have the greatest impact?

A

Unfortunately, there is no secure way to transmit across DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: IPv6’s NAT implementation is insecure.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?

A

Active/active (it will spread the wealth to every node, thus ensuring that a singular node won’t be overloaded)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of NAC will provide Isaac with the greatest amount of info about the systems that are connecting while also giving him the most amount of control of systems and their potential impact on other systems that are connected to the network?

A

Agent-based, pre-admission NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Danielle wants to capture traffic from a network so that she can analyze a VoIP conversation. Which of the following tools will allow her to review the conversation most effectively?

  • A network SIPper
  • tcpdump
  • Wireshark
  • netcat
A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wayne is concerned that an on-path attack has been used against computers he is responsible for. What artifact is he most likely to find associated with this attack?

A

A Browser Plug-in

17
Q

Elle is implementing a VoIP telephony system and wants to use secure protocols. If she has already implemented SIPS, which other protocol is she most likely to use?

A

Secure Real-time Transfer Protocol (SRTP)

18
Q

What technique is used to ensure that DNSSEC-protected DNS info is trustworthy?

A

It is digitally signed

19
Q

Fred wants to ensure that the admin interfaces for the switches and routers are protected so that they cannot be accessed by attackers. What solution should he recommend as part of his org’s network design?

A

Out-of-Band Management