Chapter 06 Quiz – Network Security Devices, Design, and Technology Flashcards

Questions 23

1
Q

Question # 01

Behavior-based monitoring attempts to overcome the limitations of both anomaly-based monitoring and signature-based monitoring by being more adaptive and proactive instead of reactive.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question # 02

An intranet is a separate open network that anyone can access with out prior authorization.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question # 03

One use of data loss prevention (DLP) is blocking the copying of files to a USB flash drive.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 04

Anomaly monitoring is designed for detecting statistical anomalies.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question # 05

What data unit is associated with the Open Systems Interconnection layer four?

a. segment
b. packet
c. frame
d. bit

A

a. segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question # 06

What kind of networking device forwards packets across different computer networks by reading destination addresses?

a. switch
b. router
c. bridge
d. firewall

A

b. router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question # 07

An administrator has two servers that host the same web content, but only one server is utilized at a given time.

What can be configured that can help to evenly distribute work across the network, and make use of both servers in a manner that is transparent to the end users?

a. stateful packet filtering
b. Load balancing
c. failover servers
d. proxy servers

A

b. Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question # 08

A firewall that keeps a record of the state of a connection between an internal computer and an external device is using what technology below?

a. Stateful frame filtering
b. Stateless frame filtering
c. Stateful packet filtering
d. Stateless packet filtering

A

c. Stateful packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question # 09

What is the name of a computer or application program that intercepts user requests from the internal secure network and then processes that request on behalf of the user?

a. forward proxy server
b. DNS server
c. VPN server
d. telnet server

A

a. forward proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question # 10

Which of the following is a server that routes incoming requests coming from an external network to the correct internal server?

a. forward proxy
b. application proxy
c. system proxy
d. reverse proxy

A

d. reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question # 11

What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

a. application-based
b. protocol-based
c. behavioral-based
d. signature-based

A

d. signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question # 12

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system?

a. system call
b. unit call
c. hardware instruction
d. system exception

A

a. system call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question # 13

When a private network uses a single public IP address, and each outgoing TCP packet uses a different port to allow for proper translation, what networking technology is in use?

a. PAT
b. PNAT
c. NAPT
d. NAT

A

a. PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question # 14

Which network address below is not a private IP address network?

a. 10.4.5.0
b. 172.63.255.0
c. 192.168.255.0
d. 172.17.16.0

A

b. 172.63.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question # 15

What vendor neutral protocol implements support for VLAN tagging?

a. ISL
b. VTP
c. 802.1Q
d. VSTP

A

c. 802.1Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question # 16

The management in your corporate office needs to group users on the network together logically even though they are attached to separate network switches. How can this be done?

a. Create a subnet for each network switch in use
b. Create additional subnets for the separate groups
c. Add all users to a single network segment
d. Create a VLAN and add the users’ computers / ports to the correct VLAN

A

d. Create a VLAN and add the users’ computers / ports to the correct VLAN

17
Q

Question # 17

What type of dedicated cryptographic processor that provides protection for cryptographic keys?

a. SSL/TLS accelerator
b. media gateway
c. SSL decryptor
d. hardware security module

A

d. hardware security module

18
Q

Question # 18

Which of the following is a software-based application that runs on a local host computer that can detect an attack as it occurs?

a. local-based intrusion detection system
b. host-based intrusion detection system
c. host-based application protection
d. local-based application protection

A

b. host-based intrusion detection system

19
Q

Question # 19

When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, what technology is being used?

a. priority tunnel
b. split tunneling
c. full tunnel
d. shared tunneling

A

b. split tunneling

20
Q

Question # 20

What type of network is a private network that can also be accessed by authorized external customers, vendors, and partners?

a. extranet
b. intranet
c. enterprise network
d. guest network

A

a. extranet

21
Q

Question # 21

If a network is completely isolated by an air gap from all other outside networks it is using what type of configuration?

a. physical network segregation
b. complete network segregation
c. network isolation
d. logical network segregation

A

a. physical network segregation

22
Q

Question # 22

What term is used to describe the software agents that are used by NAC and installed on devices to gather information?

a. NAC check agents
b. server health agents
c. host agent health checks
d. network health agents

A

c. host agent health checks

23
Q

Question # 23

Describe how Network Access Control (NAC) works.

Network Access Control assesses the condition of a device before allowing connection to a network. Any system not meeting the minimum security requirements is placed in quarantine and allowed to correct deficiencies before retesting against the NAC for access.

A

NAC examines the current state of a system or network device before it is allowed to connect to the network. Any device that does not meet a specified set of criteria, such as having the most current anti-virus signature or the software firewall properly enabled, is only allowed to connect to a “quarantine” network where the security deficiencies are corrected. After the problems are solved, the device is connected to the normal network. The goal of NAC is to prevent computers with suboptimal security from potentially infecting other computers through the network.