Architecture Frameworks and Secure Network Architectures Flashcards

1
Q

From the Internet going into the network, which of the following is the first device a packet would encounter (assuming all devices are present)?

Load balancer

DMZ

DDoS mitigator

A

DDoS mitigator

When present, the DDoS mitigator is first in the chain of devices to screen incoming traffic. It blocks the DDoS traffic that would otherwise strain the rest of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tunneling is used to achieve which of the following?

Eliminate an air gap

Connect users to a honeynet

Remote access from users outside the building

A

Remote access from users outside the building

Remote access is one of the primary uses of tunneling and VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connections to third-party content associated with your business, such as a travel agency website for corporate travel, is an example of which of the following?

Intranet

Extranet

Guest network

A

Extranet

External network connections to sections of a third-party network as a part of your business’s network is an extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a standard practice to support defense-in-depth?

Vendor diversity

User diversity

Control diversity

A

User diversity

Although diversity among users can have many benefits, defense-in-depth isn’t one of them. All of the other choices are valid components of a defense-in-depth program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Industry-standard frameworks are useful for which of the following purposes?

Aligning with an audit-based standard

Aligning IT and security with the enterprise’s business strategy

Providing high-level organization over processes

A

Aligning IT and security with the enterprise’s business strategy

Industry frameworks provide a method to align IT and security with the enterprise’s business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following represents the greatest risk if improperly configured?

Web server

Application server

Network infrastructure device

A

Network infrastructure device

When improperly configured, network infrastructure devices can allow unauthorized access to traffic traversing all devices they carry traffic to and from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of a DMZ?

Prevent direct access to secure servers from the Internet

Provide a place for corporate servers to reside so they can access the Internet

Create a safe computing environment next to the Internet

A

Prevent direct access to secure servers from the Internet

The primary purpose of a DMZ is to provide separation between the untrusted zone of the Internet and the trusted zone of enterprise systems. It does so by preventing direct access to secure servers from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you wish to monitor 100 percent of the transmissions from your customer service representatives to the Internet and other internal services, which is the best tool?

SPAN port

TAP

Aggregator switches

A

TAP

A Test Access Point (TAP) is required to monitor 100 percent of the transmissions from your customer service representatives to the Internet and other internal services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For traffic coming from the Internet into the network, which of the following is the correct order in which devices should receive the traffic?

– Firewall – DMZ – firewall – load balancer – SSL accelerator – web server

– DMZ – firewall – SSL accelerator – load balancer – web server

– Firewall – DMZ – firewall – SSL accelerator – load balancer – web server

A

– Firewall – DMZ – firewall – SSL accelerator – load balancer – web server

Firewall – DMZ – Firewall – SSL accelerator – load balancer – web server. A is missing the second firewall, B has the load balancer and SSL accelerator in the wrong order, and C is missing the first firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of network enables networking without intervening network devices?

Ad hoc

Honeynet

NAT

A

Ad hoc

An ad hoc network is constructed without central networking equipment and supports direct machine-to-machine communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Air gaps offer protection from which of the following?

Malware

Ransomware

Reverse shells

A

Reverse shells

Reverse shells or other items that call out of a network are stopped by the air gap. All of the other problems can occur by connection such as a USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For traffic coming from the Internet into the network, which of the following is the correct order in which devices should receive the traffic?

– Firewall – DMZ – firewall – DDoS mitigator – web server

– DMZ – Firewall – load balancer – web server

– Firewall – DMZ – firewall – load balancer – database server

A

– Firewall – DMZ – firewall – load balancer – database server

Firewall – DMZ – firewall – load balancer – database server. A has a missing second firewall, B has the DDoS mitigator in the wrong position, and C is missing the first firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your boss asks you to set up a new server. Where can you get the best source of information on configuration for secure operations?

User group website for the server

Secure configuration guide from the Center for Internet Security

Ask the senior admin for his notes from the last install

A

Secure configuration guide from the Center for Internet Security

The Center for Internet Security (CIS) maintains a collection of peer-reviewed, consensus-driven guidance for secure system configuration. All of the other options represent choices with potential errors from unvetted or previous bad choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To have the widest effect on security, which of the following controls should be addressed and maintained on a regular basis?

User training

Vendor diversity

Administrative controls

A

User training

User training has the widest applicability, because users touch all systems, while the other controls only touch some of them. Users also require maintenance in the form of retraining as they lose their focus on security over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VLANs provide which of the following?

Physical segregation

Physical isolation

Logical segmentation

A

Logical segmentation

VLANs are logical segmentation devices. They have no effect on the physical separation of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly