Ch 10: Security in Network Design Flashcards
Which of the following is an example of proxy server software?
Squid
What is NOT a variable that an network access control list can filter traffic with?
The operating system used by the source or destination device.
In ACL statements, using the “any” keyword is equivalent to using a wildcard mask of what value?
255.255.255.255
What kind of firewall can block designated types of traffic based on application data contained within packets?
content-filtering firewall
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
iptables
What is a SIEM (Security Information and Event Management) system utilized for?
It is a system used to evaluate data from security devices and generate alerts.
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?
STP must first select the root bridge, or master bridge.
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
BPDU guard
Which protocol designed to replace STP operates at Layer 3 of the OSI model?
Shortest Path Bridging (SPB)
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?
mac-limit
Enforcing a virtual security perimeter using a client’s geographic location is known by what term?
geofencing
When using Kerberos, what is the purpose of a ticket?
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
Which legacy authentication protocol requires mutual authentication?
Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?
RADIUS
Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?
Protected EAP (PEAP)