Chapter 10 - Security in Network Design Flashcards
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network’s specialized security devices.
True
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection
False
The Spanning Tree Protocol operates at the Network layer of the OSI model.
False
The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.
True
User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders
True
Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.
False
By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.
True
When utilizing Kerberos, an access granting ticket is the same as a key.
False
The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.
True
The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.
True
Which of the following is an example of proxy server software?
Squid
What is NOT a variable that an network access control list can filter traffic with?
The operating system used by the source or destination device.
In ACL statements, using the “any” keyword is equivalent to using a wildcard mask of what value?
255.255.255.255
What kind of firewall can block designated types of traffic based on application data contained within packets?
content-filtering firewall
On a Linux system, which command allows you to modify settings used by the builtin packet filtering firewall?
iptables
What is a SIEM (Security Information and Event Management) system utilized for?
It is a system used to evaluate data from security devices and generate alerts.