51-100 Flashcards
A company has several conference rooms with wired network jacks that are used by both employees and guests. Employees need access to internal resources and guests only need access to the Internet.
Which of the following combinations is BEST to meet the requirements?
D. 802.1x and VLANs
802.1x is a port-based authentication mechanism. It’s based on Extensible Authentication
Matt, the IT Manager, wants to create a new network available to virtual servers on the same hypervisor, and does not want this network to be routable to the firewall.
How could this BEST be accomplished?
C. Create a virtual switch
A Hyper-V Virtual Switch implements policy enforcement for security, isolation, and service levels.
A Chief Information Security Officer (CISO) is tasked with outsourcing the analysis of security logs. These will need to still be reviewed on a regular basis to ensure the security of the company has not been breached.
Which of the following cloud service options would support this requirement?
B. MaaS
Monitoring-as-a-service (MaaS) is a cloud delivery model that falls under anything as a service (XaaS). MaaS allows for the deployment of monitoring functionalities for several other services and applications within the cloud.
Joe, a security administrator, believes that a network breach has occurred in the datacenter as a result of a misconfigured router access list, allowing outside access to an SSH server.
Which of the following should Joe search for in the log files?
D. Connections to port 22
Log analysis is the art and science of reviewing audit trails, log files, or other forms of computer- generated records for evidence of policy violations, malicious events, downtimes, bottlenecks, or other issues of concern.
SSH uses TCP port 22. All protocols encrypted by SSH also use TCP port 22, such as SFTP, SHTTP, SCP, SExec, and slogin.
An organization does not have adequate resources to administer its large infrastructure. A security administrator wishes to combine the security controls of some of the network devices in the organization.
Which of the following methods would BEST accomplish this goal?
A. Unified Threat Management
When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.), what used to be called an all-in-one appliance is now known as a unified threat management (UTM) system. The advantages of combining everything into one include a reduced learning curve (you only have one product to learn), a single vendor to deal with, and—typically—reduced complexity.
A company has established a network-level connection with several business partners to facilitate business transactions. Each business partner interacts with the same four application servers within the company.
Which of the following defense types should the company implement to protect the remainder of the organization from those partners?
A. DMZ
A security administrator is segregating all web-facing server traffic from the internal network and restricting it to a single interface on a firewall.
Which of the following BEST describes this new network?
D. DMZ
A DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external network node only has direct access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term “demilitarized zone”, an area between nation states in which military operation is not permitted.
Which of the following devices would MOST likely have a DMZ interface?
A. Firewall
The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.
A security analyst needs to ensure all external traffic is able to access the company’s front-end servers but protects all access to internal resources.
Which of the following network design elements would MOST likely be recommended?
A. DMZ
Which of the following network architecture concepts is used to securely isolate at the boundary between networks?
C. DMZ
A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.
When designing a new network infrastructure, a security administrator requests that the intranet web server be placed in an isolated area of the network for security purposes.
Which of the following design elements would be implemented to comply with the security administrator’s request?
A. DMZ
A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.
Which of the following BEST describes a demilitarized zone?
A. A buffer zone between protected and unprotected networks
A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN. Often a DMZ is deployed through the use of a multihomed firewall.
Which of the following would allow the organization to divide a Class C IP address range into several ranges?
D. Subnetting
Subnetting is a dividing process used on networks to divide larger groups of hosts into smaller collections.
Which of the following IP addresses would be hosts on the same subnet given the subnet mask 255.255.255.224? (Choose two.)
C. 10.4.4.165
D. 10.4.4.189
With the given subnet mask, a maximum number of 30 hosts between IP addresses 10.4.4.161 and 10.4.4.190 are allowed. Therefore, option C and D would be hosts on the same subnet, and the other options would not.
Which of the following would the security engineer set as the subnet mask for the servers below to utilize host addresses on separate broadcast domains?
Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20
D. /29
Using this option will result in all three servers using host addresses on different broadcast domains.
Which of the following is BEST used to break a group of IP addresses into smaller network segments or blocks?
D. Subnetting
Subnetting is a dividing process used on networks to divide larger groups of hosts into smaller collections.
A small company can only afford to buy an all-in-one wireless router/switch. The company has 3 wireless BYOD users and 2 web servers without wireless access.
Which of the following should the company configure to protect the servers from the user devices? (Choose two.)
E. Create a server VLAN
F. Create an ACL to access the server
We can protect the servers from the user devices by separating them into separate VLANs (virtual local area networks).
A network engineer is setting up a network for a company. There is a BYOD policy for the employees so that they can connect their laptops and mobile devices.
Which of the following technologies should be employed to separate the administrative network from the network in which all of the employees’ devices are connected?
B. VLAN
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.
Pete, a network administrator, is capturing packets on the network and notices that a large amount of the traffic on the LAN is SIP and RTP protocols.
Which of the following should he do to segment that traffic from the other traffic?
B. Create a voice VLAN
It is a common and recommended practice to separate voice and data traffic by using VLANs. Separating voice and data traffic using VLANs provides a solid security boundary, preventing data applications from reaching the voice traffic. It also gives you a simpler method to deploy QoS, prioritizing the voice traffic over the data.
An administrator connects VoIP phones to the same switch as the network PCs and printers.
Which of the following would provide the BEST logical separation of these three device types while still allowing traffic between them via ACL?
A. Create three VLANs on the switch connected to a router
A virtual local area network (VLAN) is a hardware-imposed network segmentation created by switches. VLANs are used for traffic management. Communications between ports within the same VLAN occur without hindrance, but communications between VLANs require a routing function.