Chapter 2: Technologies and Tools Practice Tests Flashcards

1
Q

The ACL for a firewall has an allow rule for HTTP, HTTPS, and LDAP. What will happen when a user tries to download a file from an external FTP server?

A

Because there is no allow rule for FTP or TCP port 21, explicit deny will be applied, preventing the download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator is configuring a switch and is unsure whether to enable port security or 802.1x. What can you advise on both of these technologies?

A

Port security disables the ports and reduces the functionality of the switch, however, 802.1x authenticates the device, so the ports remain open with rogue devices being prevented access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security administrator is enabling IPSec on the file server that hosts the financial server. They are then going to enable IPSec between the server and all of the desktops being the financial users. What mode of IPSec will be adopted?

A

Using IPSec between servers uses transport mode, but when IPSec is used over the internet, it uses tunnel mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of firewall is best suited to deal with an incoming SYN flood attack?

A

A stateful firewall inspects incoming traffic down to the commands used and packet sizes and would realize that the three-way handshake is not being established and would prevent the SYN flood attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security administrator is enabling an L2TP/IPSec on a virtual private network. What will be the role of a VPN concentrator?

A

The role of the VPN concentrator is to set up the secure session for the VPN connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your company is experiencing a very high volume of web traffic coming to their internet web servers. What is the best way to ensure that the people coming to your website get the web pages in a timely manner?

A

We would install a load balancer to deal with the vast amount of web traffic and we would set up affinity in the regions with limited bandwidth with all of the requests going to the same web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your company is experiencing a high volume of DDoS traffic heading for your company’s network. What is the best way to deal with this traffic?

A

The best way to deal with a high volume of DDoS traffic is to use as a firewall to prevent this traffic entering your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of DNS round-robin, and what are the pitfalls of using it?

A

DNS round robin can be used to balance web traffic as it rotates through the A records. The pitfall is that it does not know the status of the web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can I capture the commands going to a network-based gaming application?

A

To capture commands going across the network, we need to use a packet sniffer, also known as a protocol analyzer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your company provides internet access to films. What type of port should we use to ensure that the films run smoothly?

A

A UDP port needs to be used for streaming video; TCP would be far too slow as it uses a three-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of tool can we use to determine the patch level version of a web server? Name three tools that can be used for this technique.

A

To discover information such as the patch level version of a web server, we would use banner grabbing. Common tools for banner grabbing include telnet, nmap, or netcat (nc).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The security administrator has noticed a rise in the number of unauthorized hosts appearing on your network. What two tools can be implemented so that they are notified when someone attaches a new host?

A

Nmap and NIDS can both identify when a new host enters your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The security administrator has noticed that there has been an increase in the number of failed logins attempts on network-based computers. The account lockout policy allows three failed login attempts. What type of tool can they use for real-time monitoring of these events?

A

A SIEM system should be implemented as it does real-time monitoring and can use an aggregation engine to identify attacks across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The CEO has written a new policy stating that all of the security logs on domain controllers are to be copied to a central location daily. These log files need to be secured to ensure that they have not been tampered with after collection. What action should the security administrator take to fulfill this policy?

A

To fulfill the policy, the security should store the security logs in a WORM drive (Write Once Read Many); this allows files to be copied to the drive but not altered or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an attack on a host is made, a connection is established. Which two tools can capture the established connection so that the attacker can be identified?

A

Two tools that can identify an established session is the Windows command-line tool netstat and the Linux tool called netcat, also known as nc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What data format cannot be analyzed by any of the company’s monitoring tools?

A

Security monitoring tools cannot analyze data if it is in an encrypted format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three main components of a proxy server?

A

A proxy filter has a URL filter to block access to certain websites, content filter to stop access to gaming websites, and web page caching to provide faster and more secure access to web pages. It cannot cache the stock exchange as the data is too volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of a reverse proxy?

A

A reverse proxy authenticates incoming connections and decrypts incoming traffic so that the inline NIPS can monitor it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What technique does an iPhone use to send software updates to the phone?

A

A mobile telephone uses over-the-air (OTA) updates where, ideally, the phone should have a full battery or be connected to a power socket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the danger of someone taking an unauthorized smartphone into a research and development laboratory?

A

A smartphone could be used to record a conversation and take videos and pictures of sensitive and private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If I am using my personal phone as a BYOD device, what can be done to keep business data separate from my personal data?

A

To keep your business data separate from your personal data, you would storage segmentation, also known as containerization, to isolate the data from other data. This could be in the format of installing a micro SD card into the phone.

22
Q

What would be a safe, restricted, and contained environment that an IT team could provide to contractors to use?

A

Using a Virtual Desktop Infrastructure (VDI) environment, the contractors would have an isolated desktop, depending on the network connections assigned to it. If they were to test applications, they could be sandboxed inside of their virtual machines.

23
Q

If I want to use a third-party application on my carrier-locked iOS phone, what two stages should I perform to enable the application to run?

A

You would first of all have to carry out carrier unlocking, known as jailbreaking, and then use a technique called sideloading to load the third-party software. This would not prevent you from using the Apple Store.

24
Q

What would I need to use in conjunction with a mobile device to limit the bandwidth being used when I download applications to the device?

A

Using a download manager would state how many connections are allowed and the amount of bandwidth that they are allowed to use.

25
Q

If I want to use a third-party application on my carrier-locked Android phone, what two stages should I perform to enable the application to run?

A

You would first of all have to carry out carrier unlocking, known as rooting, and then use a technique called sideloading to load the third-party software.

26
Q

In what circumstances would I remote-wipe a device using the mobile device management system; (name two)?

A

You would only remote wipe a mobile device if it was lost or stolen to prevent the data from falling into the wrong hands.

27
Q

The network administrator has been receiving support calls relating to the wireless access point. What tool should they use to diagnose the problem?

A

To diagnose the problems with a wireless access point, the network administrator would use a wireless packet sniffer to see the packets come from and to the wireless access point.

28
Q

When the SSID of a wireless access point has been disabled, what two types of devices can be used to discover the SSID?

A

You can either use a wireless packet sniffer as the SSID is inside the packet destination for the wireless access point or an SSID de-cloak device to discover the disabled SSID.

29
Q

When I was on holiday in Las Vegas, all of the pictures I submitted to Facebook had the location where the picture was taken. Which tool carried out the labeling of photographs?

A

GPS tagging inserts the location when a picture is taken.

30
Q

Which tools can I use to see if the DLL files of an application have been altered or tampered with?

A

A file integrity checker such as Microsoft’s System File Checker (SFC) can determine whether the DLL files have been tampered with.

31
Q

When setting up certificates on a mobile device, the administrator is receiving certificate trust errors. What two actions should the administrator carry out first?

A

The administrator must first of all check the certificate to see whether it is still valid and then check whether it has been added to the Trusted Root Certification Authorities store on the local machine.

32
Q

A new employee was given a company laptop with the correct certificates installed. Two weeks later, they report to the IT team that they are getting trust errors with the certificates. What has the new employee done to cause this error?

A

When the certificate was installed, it must have been valid and then added to the Trusted Root Certification Authorities store. The new employee must have deleted the local cache, removing the certificate from the Trusted Root Certification Authorities store.

33
Q

A salesperson cannot get internet access on their laptop, so they connect their 4G phone to the laptop to provide internet access. What technique have they just used?

A

When a laptop gets its internet connection via phone, this is known as tethering.

34
Q

A security administrator has found that many company devices have been tampered with over the past week. When they have looked into the security log files, they found that nothing out of the ordinary had been recorded. What has been tampering with the equipment?

A

As most of the security has been circumvented without detection, it looks like a malicious insider threat has been carried out.

35
Q

A retailer wants to allow its customers to use a wireless payment method to pay for small transactions. What payment method must the customer adopt?

A

Near Field Communication (NFC) is a wireless payment system used by bank cards or mobile phones. It is limited to a distance of about 4 inches from the reader.

36
Q

An audit has been carried out against the assets held by the IT team and the auditor has found that the company owns 300 Windows 10 licenses, but the software has been installed on 302 laptops. What is this violation known as?

A

If the company has used more licenses than it originally purchased, this is called a license compliance violation and could result in a regulatory fine.

37
Q

A small company is going to purchase a firewall and needs to ensure that the firewall is an all-in-one device providing more protection than just simply being a firewall. What type of firewall would you recommend that they purchase?

A

The all-in-one firewall device is called Unified Threat Management (UTM); this provides firewall, anti-malware, and anti-spam protection as well as content and URL filtering.

38
Q

A security administrator has found that remote users have been infecting the company network with viruses. What tool do they need to implement to mitigate this risk?

A

Once a remote user has been authenticated, if the security administrator implements Network Access Control (NAC), it would check that the device was fully patched before it was allowed onto the network.

39
Q

The security team has discovered that an attacker has been logging in twice to each machine but a security alert has not been logged as the company has an account lockout threshold of three attempts. What type of system should the company implement to alert them of any re-occurrence of this event?

A

If a company has an account lockout policy of three failed logins and they used a SIEM system, it would identify three failed logins, even if it was only one failed login on three separate machines. It also works in real time.

40
Q

What type of system does the security administrator need to implement to prevent anyone from emailing out credit card information?

A

To prevent PII or sensitive information leaving the company by email, the administrator should implement a Data Loss Prevention (DLP) system. It uses a pattern match and if the information matches the pattern, it is prevented from leaving the network.

41
Q

What type of security technology can prevent a hacker from accessing a computer’s registry remotely?

A

If the security administrator implemented Data Execution Prevention (DEP), any remote session would be limited to areas such as temporary internet files and not access the management of the system.

42
Q

What common security issue reduces the amount of bandwidth available to the company coupled with reducing the amount of disk space available on a computer?

A

Downloading unauthorized software would reduce both the amount of available bandwidth and the amount of free disk space available.

43
Q

What security technology can be implemented on a virtual machine to protect it against attacks?

A

A Host-based Intrusion Prevention System (HIPS) could be installed inside a virtual machine to prevent attacks.

44
Q

What security technology only allows approved applications to run on a system? How does it work?

A

An application whitelist lays out what application can be installed on a system. You can do this by adding the application name, the name of the .msi or .exe files or .dll binaries.

45
Q

Why would a security administrator archive security logs onto a WORM drive?

A

Storing information on a WORM drive prevents the deletion or amendment of the data stored there.

46
Q

What type of security technology would an administrator implement to protect a web server’s applications and data?

A

A security administrator would use a web application firewall to protect a web server’s application and data from attack.

47
Q

What is the purpose of push notification services?

A

Push notification services inform a user that mail has arrived at their inbox.

48
Q

A security administrator wants to implement a Bluetooth type of technology that uses low power. What technology should he implement?

A

ANT is a bespoke, low-power Bluetooth technology.

49
Q

A company has suffered from an increase in the theft of its high-end laptops. What technology can be implemented to prevent such laptops from being stolen?

A

If the company implemented geofencing, it would prevent the high-end laptops from going outside of the boundaries set.

50
Q

A security administrator has discovered that the incorrect authentication information has been used to access the network. What type of technology is the attacker using?

A

The biometric authentication failure acceptance rate allows the incorrect authentication method to gain access to a network