Chapter 2: Technologies and Tools Practice Tests Flashcards
The ACL for a firewall has an allow rule for HTTP, HTTPS, and LDAP. What will happen when a user tries to download a file from an external FTP server?
Because there is no allow rule for FTP or TCP port 21, explicit deny will be applied, preventing the download.
A network administrator is configuring a switch and is unsure whether to enable port security or 802.1x. What can you advise on both of these technologies?
Port security disables the ports and reduces the functionality of the switch, however, 802.1x authenticates the device, so the ports remain open with rogue devices being prevented access.
A security administrator is enabling IPSec on the file server that hosts the financial server. They are then going to enable IPSec between the server and all of the desktops being the financial users. What mode of IPSec will be adopted?
Using IPSec between servers uses transport mode, but when IPSec is used over the internet, it uses tunnel mode.
What type of firewall is best suited to deal with an incoming SYN flood attack?
A stateful firewall inspects incoming traffic down to the commands used and packet sizes and would realize that the three-way handshake is not being established and would prevent the SYN flood attack.
A security administrator is enabling an L2TP/IPSec on a virtual private network. What will be the role of a VPN concentrator?
The role of the VPN concentrator is to set up the secure session for the VPN connection.
Your company is experiencing a very high volume of web traffic coming to their internet web servers. What is the best way to ensure that the people coming to your website get the web pages in a timely manner?
We would install a load balancer to deal with the vast amount of web traffic and we would set up affinity in the regions with limited bandwidth with all of the requests going to the same web server.
Your company is experiencing a high volume of DDoS traffic heading for your company’s network. What is the best way to deal with this traffic?
The best way to deal with a high volume of DDoS traffic is to use as a firewall to prevent this traffic entering your network.
What is the purpose of DNS round-robin, and what are the pitfalls of using it?
DNS round robin can be used to balance web traffic as it rotates through the A records. The pitfall is that it does not know the status of the web server.
How can I capture the commands going to a network-based gaming application?
To capture commands going across the network, we need to use a packet sniffer, also known as a protocol analyzer.
Your company provides internet access to films. What type of port should we use to ensure that the films run smoothly?
A UDP port needs to be used for streaming video; TCP would be far too slow as it uses a three-way handshake.
What type of tool can we use to determine the patch level version of a web server? Name three tools that can be used for this technique.
To discover information such as the patch level version of a web server, we would use banner grabbing. Common tools for banner grabbing include telnet, nmap, or netcat (nc).
The security administrator has noticed a rise in the number of unauthorized hosts appearing on your network. What two tools can be implemented so that they are notified when someone attaches a new host?
Nmap and NIDS can both identify when a new host enters your network.
The security administrator has noticed that there has been an increase in the number of failed logins attempts on network-based computers. The account lockout policy allows three failed login attempts. What type of tool can they use for real-time monitoring of these events?
A SIEM system should be implemented as it does real-time monitoring and can use an aggregation engine to identify attacks across the network.
The CEO has written a new policy stating that all of the security logs on domain controllers are to be copied to a central location daily. These log files need to be secured to ensure that they have not been tampered with after collection. What action should the security administrator take to fulfill this policy?
To fulfill the policy, the security should store the security logs in a WORM drive (Write Once Read Many); this allows files to be copied to the drive but not altered or deleted.
When an attack on a host is made, a connection is established. Which two tools can capture the established connection so that the attacker can be identified?
Two tools that can identify an established session is the Windows command-line tool netstat and the Linux tool called netcat, also known as nc.
What data format cannot be analyzed by any of the company’s monitoring tools?
Security monitoring tools cannot analyze data if it is in an encrypted format
What are the three main components of a proxy server?
A proxy filter has a URL filter to block access to certain websites, content filter to stop access to gaming websites, and web page caching to provide faster and more secure access to web pages. It cannot cache the stock exchange as the data is too volatile.
What is the purpose of a reverse proxy?
A reverse proxy authenticates incoming connections and decrypts incoming traffic so that the inline NIPS can monitor it.
What technique does an iPhone use to send software updates to the phone?
A mobile telephone uses over-the-air (OTA) updates where, ideally, the phone should have a full battery or be connected to a power socket.
What is the danger of someone taking an unauthorized smartphone into a research and development laboratory?
A smartphone could be used to record a conversation and take videos and pictures of sensitive and private information.