Chapter 10: Security in Network Design Flashcards

1
Q

By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?

RADIUS
TACACS+
Kerberos
Google Authenticator

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Enforcing a virtual security perimeter using a client’s geographic location is known by what term?

geofencing
geolocating
geohashing
geolocking

A

geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Open System Authentication, how does authentication occur?

The client sends a pre-shared key along with the access point’s SSID.

The client requests an encrypted tunnel, after which, the client’s MAC serves as the authentication.

The access point forces the client to authenticate via a captive portal, after which all communication is encrypted.

The client “authenticates” using only the SSID name. In other words, no real authentication occurs.

A

The client “authenticates” using only the SSID name. In other words, no real authentication occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

BPDU guard
BPDU filter
root guard
BPDU drop

A

BPDU guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

iptables
netwall
modfire
ipf

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Group Policy utility can be opened by typing what name into a Run box?

grppol.msc
secpol.msc
gpedit.msc
grouppol.msc

A

gpedit.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

802.11i
802.11j
802.1X
802.11h

A

802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

accounting
accessibility
authorization
authentication

A

authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NOT a variable that an network access control list can filter traffic with?

The Transport layer protocol used for the packet.

The Network layer protocol used for the packet.

The operating system used by the source or destination device.

The source or destination TCP/UDP port number in the packet.

A

The operating system used by the source or destination device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a SIEM (Security Information and Event Management) system utilized for?

It is a system that monitors security device hardware availability.

It is an intellectual property protection software that prevents data links, and generates alerts.

It is an advanced intrusion protection system with a GUI-frontend.

It is a system used to evaluate data from security devices and generate alerts.

A

It is a system used to evaluate data from security devices and generate alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What statement correctly describes a stateless firewall?

A stateless firewall filters packets based on source and destination IP addresses.

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.

A stateless firewall blocks designated types of traffic based on application data contained within packets.

A

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What scenario might be ideal for the use of root guard in configuring a switch?

You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.

You wish to disable STP on a port connected to a partnered company’s switch.

You wish to block BPDUs on an access port serving network hosts.
You Answered

You wish to prevent a rogue switch or computer from hijacking the network’s STP paths.

A

You wih to prevent switches beyon a certian port form becoing th root bridge, but still wish to use STP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When using Kerberos, what is the purpose of a ticket?

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

It is the event that is generated when auditing a resource and unauthorized access is attempted.

It is a key used by the client to gain access to services that are protected by the key on the network.

It is the name for a Kerberos client or user.

A

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

STP must first select the root bridge, or master bridge.

STP examines the possible paths between all other bridges.

STP begins to block BPDUs on non-designated ports.

STP disables links that are not part of a shortest path.

A

STP must first select the root bridge, or master bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn’t change?

file integrity monitoring (FIM)
file checksum watching (FCW)
file change management (FCM)
file access auditing (FAA)

A

file integrity monitoring (FIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

LEAP
EAP-FAS
Protected EAP (PEAP)
EAP-TLS

A

Protected EAP (PEAP)

17
Q

Which legacy authentication protocol requires mutual authentication?

Password Authentication Protocol (PAP)

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

Challenge Handshake Authentication Protocol (CHAP)

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

A

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

18
Q

Which of the following is an example of proxy server software?

Squid
Apache
BIND
Snort

A

Squid

19
Q

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

Shortest Path Bridging (SPB)
Multiple Spanning Tree Protocol (MSTP)
Rapid Spanning Tree Protocol (RSTP)
Transparent Interconnection of Lots of Links (TRILL)

A

Shortest Path Bridging (SPB)

20
Q

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the allowed-mac command to filter by MAC address.

Use the secure port mac-address command to limit the port to learned addresses only.

Use the mac-limit command to prevent more than one MAC from being accepted.

Use the switchport port-security command to enable MAC filtering

A

Use the switchport port-security command to enable MAC filtering