Chapter 13 Flashcards

1
Q

What type of function is being performed when a router screens packets based on information in the packet header?

A

router screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following describes a team of professionals whose job is to detect and respond to security incidents?

A

Security Operations Center (SOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for moving those packets?

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To see what information is stored in RAM, a Cisco administrator would enter which command?

A

show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A firewall that blocks a Telnet session from leaving the network over TCP port 443 uses which of the following?

A

Application layer inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application layer inspection

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following describes a tool that collects logs and alerts from multiple devices for security analysis?

A

Security Information and Event Management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following Cisco router components holds the router’s configuration file, and retains the configuration file’s information from being lost if the router is turned off?

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls are installed on a network to protect a company’s internal network from dangers on the Internet. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of Cisco access lists can restrict IP traffic entering or leaving a router’s interface based only on the source IP address?

A

Standard IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web filters can prevent which type of malicious activity?

A

Drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A large organization that is responsible for sensitive or critical data may elect to create which of the following to do damage assessment, risk remediation, and legal consultation?

A

Security Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A honeypot might be used in a network for which of the following reasons? (Choose all that apply.)

A

Lure or entrap hackers so that law enforcement can be informed.

Gather information on new attacks and threats.

Distract hackers from attacking legitimate network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A router using a distance-vector routing protocol sends only new information to other routers on the network. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A stateful packet inspection firewall keeps track of network connections by using which of the following?

A

A state table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A standard IP access list can’t filter IP packets based on a destination address. True or False?

A

True

17
Q

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

A

DMZ

18
Q

A benchmark is an industry consensus of best practices for writing access lists. True or False?

A

False

19
Q

What type of packet filtering records session-specific information about a network connection, including the ports a client uses?

A

Stateful

20
Q

Which of the following Cisco router components holds the router’s running configuration, routing tables, and buffers; this information is lost if the router is turned off?

A

RAM

21
Q

Which type of memory contains a minimum version of Cisco’s IOS that is used to boot the router if the Cisco IOS becomes corrupted?

A

Read-only memory

22
Q

A standard IP access list is restricted to source IP addresses.

A

True

23
Q

What type of an IDS is being used when it does not take any action to stop or prevent an activity occurring?

A

passive system

24
Q

Which type of routing protocol advertises only new paths to other routers on the network?

A

Link-state routing protocol

25
Q

What type of firewall inspects network traffic at a higher level in the OSI model than a traditional stateful packet inspection firewall does?

A

application-aware firewall

26
Q

What type of IDSs/IPSs monitors activity on network segments by sniffing traffic as it flows over the network and alerting a security administrator when something suspicious occurs?

A

Network-based

27
Q

Which component holds the IOS a Cisco router can use?

A

Flash memory

28
Q

Firewalls use which of the following to hide the internal network topology from outside users?

A

NAT

29
Q

What specific type of tools can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security tools?

A

SIEM

30
Q

Which of the following Cisco components stores a router’s running configuration, routing tables, and buffers?

A

RAM