ch 11 Flashcards
As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario?
access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5
Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?
SoD (Separation of Duties)
You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?
DAI (Dynamic ARP Inspection)
is a configuration on a switch that compares incoming messages with the switch’s DHCP snooping binding table to determine whether the message’s source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. DAI helps protect against ARP spoofing attacks.
Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?
IPS (Intrusion Prevention System)
is a stand-alone device, an application, or a built-in feature running on a workstation, server, switch, router, or firewall that stands in-line between an attacker and the targeted network or host and can prevent traffic from reaching that network or host.
*Pic: Placement of IPS devices and software on a network.
Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised.
Use proxy servers to mask Internet activities
Proxy Server is a server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
*Pic: A proxy server is used to connect to the nternet.
You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario?
ACL (Access Control List)
is a list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.
MNT Enterprises has hired you as a network administrator to help the organization design a more comprehensive traffic analysis and protection tool to protect the entire network from hackers trying to flood the network with traffic. Which of the following will you use in this situation?
NIPS (network-based intrusion prevention system)
is a type of intrusion prevention that protects an entire network and is situated at the edge of the network or in a network’s screened subnet.
An IDS (intrusion detection system) has been installed in your organization as a stand-alone device to monitor network traffic and to generate alerts about suspicious activities. You as a network analyst have been assigned to check the effectiveness of the device. You notice that the effectiveness of the IDS has significantly come down since its installation because it has not been updated. Which of the following processes will you use in updating the IDS?
Signature Management
is the process of regularly updating the signatures used to monitor a network’s traffic.
Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure?
Auditing
Which authorization method grants access to a user when the user’s classification and category match those of a resource?
MAC (mandatory access control)
is a method of access control where resources are organized into hierarchical classifications, such as “confidential” or “top secret,” and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user’s classification and category match those of a resource, then the user is given access.
The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees’ access to these websites. Which of the following firewalls will you use in this scenario?
Application Layer Firewall
is a firewall that can block designated types of traffic based on application data contained within packets.
As a network administrator, you are already aware of the possible option of using a default trust relationship between a network device and another by a hacker to access an entire network. Which of the following security measures will you use to prevent a possible DoS attack that can be induced by sending high volumes of router advertisement messages?
RA Guard
A feature that can be configured on switches to filter RA messages according to interface, MAC or IP address, router priority, or other factors.
Which of the following is a device or an application that stores or generates information known only to its authorized user?
Security Token
is a device or piece of software used for authentication that stores or generates information, such as a series of numbers or letters, known only to its authorized user.
In which of the following do the bits work opposite of how bits in a subnet work?
Wildcard Mask
statements can also specify network segments (groups of IP addresses) by using a network address for the segment and a wildcard mask. The bits in a wildcard mask work opposite of how bits in a subnet mask work. The 0s in the wildcard mask say to match the IP address bits to the network address given, and the 1s say you don’t care what the value of those bits are. For example, a wildcard mask of 0.0.0.255
Which of the following will you use to monitor and analyze data stored in logs?
SIEM (Security Information and Event Management)
is software that can be configured to evaluate data logs from IDS, IPS, firewalls, and proxy servers to detect significant events that require the attention of IT staff according to predefined rules.
Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario.
A Host-Based Firewall
is a firewall that only protects the computer on which it’s installed.