Chapter 10 Flashcards
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network’s specialized security devices.
T/F
T
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
T/F
F
The Spanning Tree Protocol operates at the Network layer of the OSI model.
T/F
F
The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.
T/F
T
User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.
T/F
T
Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.
T/F
F
By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.
T/F
T
When utilizing Kerberos, an access granting ticket is the same as a key.
T/F
F
The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.
T/F
T
The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.
T/F
T
Which of the following is an example of proxy server software?
Squid
BIND
Snort
Apache
Squid
What is NOT a variable that an network access control list can filter traffic with?
The Network layer protocol used for the packet.
The Transport layer protocol used for the packet.
The source or destination TCP/UDP port number in the packet.
The operating system used by the source or destination device.
The operating system used by the source or destination device.
In ACL statements, using the “any” keyword is equivalent to using a wildcard mask of what value?
0.0.0.0
255.255.255.255
255.255.0.0
0.0.255.255
255.255.255.255
What kind of firewall can block designated types of traffic based on application data contained within packets?
stateful firewall
stateless firewall
content-filtering firewall
packet-filtering firewall
content-filtering firewall
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
ipf
modfire
iptables
netwall
iptables
What is a SIEM (Security Information and Event Management) system utilized for?
It is an advanced intrusion protection system with a GUI-frontend.
It is a system used to evaluate data from security devices and generate alerts.
It is an intellectual property protection software that prevents data links, and generates alerts.
It is a system that monitors security device hardware availability.
It is a system used to evaluate data from security devices and generate alerts.
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?
STP must first select the root bridge, or master bridge.
STP examines the possible paths between all other bridges.
STP disables links that are not part of a shortest path.
STP begins to block BPDUs on non-designated ports.
STP must first select the root bridge, or master bridge.
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
BPDU filter
BPDU guard
root guard
BPDU drop
BPDU guard
Which protocol designed to replace STP operates at Layer 3 of the OSI model?
Rapid Spanning Tree Protocol (RSTP)
Transparent Interconnection of Lots of Links (TRILL)
Shortest Path Bridging (SPB)
Multiple Spanning Tree Protocol (MSTP)
Shortest Path Bridging (SPB)
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?
set max-mac
set total-macs
mac-address limit
mac-limit
mac-limit
Enforcing a virtual security perimeter using a client’s geographic location is known by what term?
geohashing
geofencing
geolocating
geolocking
geofencing
When using Kerberos, what is the purpose of a ticket?
It is the name for a Kerberos client or user.
It is a key used by the client to gain access to services that are protected by the key on the network.
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
It is the event that is generated when auditing a resource and unauthorized access is attempted.
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
Which legacy authentication protocol requires mutual authentication?
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)
Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?
Google Authenticator
RADIUS
TACACS+
Kerberos
RADIUS