Chapter 5 Flashcards
Where should an organization’s web server be placed?
DMZ
Honeynet
Extranet
Intranet
DMZ
Which of the following is a privately controlled portion of a network that is accessible to some specific external entities?
Extranet
Internet
Intranet
MAN
Extranet
You want to create a collection of computers on your network that appear to have valuable data but actually store fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the attacker’s methods.
Which feature should you implement?
NIDS
NIPS
Honeynet
Extranet
Honeynet
A honeypot is used for which purpose?
To prevent sensitive data from being accessed
To entrap intruders
To disable an intruder’s system
To delay intruders in order to gather auditing data
To delay intruders in order to gather auditing data
Which of the following devices can apply quality of service and traffic-shaping rules based on what created the network traffic?
Network access control
All-in-one security appliances
Proxy server
Application-aware devices
Application-aware devices
You are the office manager of a small financial credit business. Your company handles personal financial information for clients seeking small loans over the internet. You are aware of your obligation to secure clients records, but the budget is an issue for your company.
Which item would provide the BEST security for this situation?
All-in-one security appliance
Firewall on your gateway server to the internet
Proxy server with access controls
Network access control system
All-in-one security appliance
You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library’s computers. The students use the computers to search the internet for research paper content. The school budget is limited.
Which content filtering option would you choose?
Allow all content except for the content you have identified as restricted.
Block all content except for content you have identified as permissible.
Block specific DNS domain names.
Restrict content based on content categories.
Restrict content based on content categories.
Which of the following BEST describes a honeyfile?
A single file setup to entice and trap attackers.
A file that has been digitally signed.
A default file in the /etc/security directory.
A file used to authenticate.
A single file setup to entice and trap attackers.
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks.
You are concerned that these computers could pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches are installed.
Which solution should you use?
VLAN
DMZ
NAC
NIDS
NAC
A proxy server can be configured to do which of the following?
Allow all content except for the content you have identified as restricted.
Act as a unified threat security device or web security gateway.
Block all content except for the content you have identified as permissible.
Restrict users on the inside of a network from getting out to the internet.
Restrict users on the inside of a network from getting out to the internet.
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?
Circuit proxy
Bastion or sacrificial host
Kernel proxy
Multi-homed
Bastion or sacrificial host
Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet?
Padded cell
Intranet
Extranet
DMZ
DMZ
Which of the following is the MOST likely to happen if the firewall managing traffic into the DMZ fails?
Nothing will happen - all devices will stay protected.
Only the servers in the DMZ are compromised, but the LAN will stay protected.
The LAN is compromised, but the DMZ stays protected.
All devices in the DMZ and LAN will be compromised.
Only the servers in the DMZ are compromised, but the LAN will stay protected.
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.
Which solution should you use?
Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.
Use a single firewall. Put the web server and the private network behind the firewall.
Use firewalls to create a DMZ. Place the web server and the private network inside the DMZ.
Use a single firewall. Put the web server in front of the firewall and the private network behind the firewall.
Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.
How many network interfaces does a dual-homed gateway typically have?
4
1
3
2
3
What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ?
Subnet
VPN
FTP
Packet filters
Packet filters
You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information.
How should you place devices on the network to best protect the servers? (Select two.)
Put the database server on the private network.
Put the web server on the private network.
Put the web server inside the DMZ.
Put the database server inside the DMZ.
Put the database server on the private network.
Put the web server inside the DMZ.
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
You want to encrypt data sent between two hosts using the internet.
You want internet users to see a single IP address when accessing your company network.
You want to protect a public web server from attack.
You want to detect and respond to attacks in real time.
You want to protect a public web server from attack.
Which of the following is another name for a firewall that performs router functions?
Screening router
Screened subnet
Screened-host gateway
Dual-homed gateway
Screening router
Which of the following is the BEST solution to allow access to private resources from the internet?
Subnet
VPN
Packet filters
FTP
VPN
Which of the following describes how access control lists can be used to improve network security?
An access control list identifies traffic that must use authentication or encryption.
An access control list filters traffic based on the frame header, such as source or destination MAC address.
An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.
An access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks.
An access control list filters traffic based on the IP header information, such as source or destination IP address, protocol, or socket number.
Which of the following are features of an application-level gateway? (Select two.)
Stops each packet at the firewall for inspection
Reassembles entire messages
Verifies that packets are properly sequenced
Uses access control lists
Allows only valid packets within approved sessions
Stops each packet at the firewall for inspection
Reassembles entire messages
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Packet-filtering firewall
Application-level gateway
Circuit-level gateway
VPN concentrator
Circuit-level gateway
Jessica needs to set up a firewall to protect her internal network from the internet. Which of the following would be the BEST type of firewall for her to use?
Stateful
Tunneling
Software
Hardware
Hardware
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.
You want to protect the laptop from internet-based attacks. Which solution should you use?
VPN concentrator
Proxy server
Host-based firewall
Network-based firewall
Host-based firewall
You have just installed a packet-filtering firewall on your network. Which options are you able to set on your firewall? (Select all that apply.)
Checksum
Destination address of a packet
Digital signature
Port number
Source address of a packet
Sequence number
Acknowledgement number
Destination address of a packet
Port number
Source address of a packet
When designing a firewall, what is the recommended approach for opening and closing ports?
Close all ports; open only ports required by applications inside the DMZ.
Open all ports; close ports that show improper traffic or attacks in progress.
Open all ports; close ports that expose common network attacks.
Close all ports; open ports 20, 21, 53, 80, and 443.
Close all ports.
Close all ports; open only ports required by applications inside the DMZ.
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites you want on the internet except for two.
What might be causing the problem?
A firewall is blocking ports 80 and 443.
A proxy server is blocking access to the websites.
The router has not been configured to perform port forwarding.
Port triggering is redirecting traffic to the wrong IP address.
A proxy server is blocking access to the websites.
Which of the following best describes a stateful inspection?
Designed to sit between a host and a web server and communicate with the server on behalf of the host.
Allows all internal traffic to share a single public IP address when connecting to an outside entity.
Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.
Offers secure connectivity between many entities and uses encryption to provide an effective defense against sniffing.
Determines the legitimacy of traffic based on the state of the connection from which the traffic originated.
Which of the following are characteristics of a packet-filtering firewall? (Select two.)
Filters IP address and port
Filters based on URL
Filters based on sessions
Stateful
Stateless
Filters IP address and port
Stateless
You want to connect your small company network to the internet. Your ISP provides you with a single IP address that is to be shared between all hosts on your private network. You do not want external hosts to be able to initiate connection to internal hosts. Which type of Network Address Translation (NAT) should you implement?
Static
Restricted
Dynamic
Shared
Dynamic
Which NAT implementation assigns two IP addresses to the public NAT interface, allowing traffic to flow in both directions?
PAT
Dynamic and static
Static
Dynamic
Dynamic and static
Which device is NAT typically implemented on?
Gateway router
AD server
RADIUS server
ISP router
Gateway router
Which problem does NAT help address?
IPSec not working properly
The shortage of IPv6 addresses
Registering IP addresses with an ISP
The shortage of IPv4 addresses
The shortage of IPv4 addresses
At which layer of the OSI model do NAT routers operate?
Layer 5 (Session layer)
Layer 1 (Physical layer)
Layer 7 (Application layer)
Layer 3 (Network layer)
Layer 3 (Network layer)
How many concurrent connections does NAT support?
90
300
Unlimited
5,000
5,000
Which of the following does a NAT router use to associate a port number with a request from a private host?
PAT
IPv4
Dynamic NAT
Static NAT
PAT
A network device is given an IP address of 172.16.0.55. Which type of network is this device on?
Class C private network
IPv6 private network
Class A private network
Class B private network
Class B private network
You have a small network at home that is connected to the internet. On your home network, you have a server with the IP address of 192.168.55.199/16. You have a single public address that is shared by all hosts on your private network.
You want to configure the server as a web server and allow internet hosts to contact the server to browse a personal website.
What should you use to allow access?
DNS A record
DNS CNAME record
Multicast
Static NAT
Dynamic NAT
Static NAT
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don’t want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.
Which method of NAT translation should you implement for these servers?
Static
Overloading
Restricted
Dynamic
Static
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization’s order database.
Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using Wi-Fi access provided by hotels, restaurants, and airports.
Many of these locations provide unencrypted public Wi-Fi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection.
Which key steps should you take when implementing this configuration? (Select two.)
Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection
Configure the browser to send HTTPS requests through the VPN connection
Configure the VPN connection to use IPsec
Configure the VPN connection to use MS-CHAPv2
Configure the VPN connection to use PPTP
Configure the browser to send HTTPS requests directly to the Wi-Fi network without going through the VPN connection
Configure the VPN connection to use IPsec
A group of salesmen would like to remotely access your private network through the internet while they are traveling. You want to control access to the private network through a single server.
Which solution should you implement?
IDS
IPS
VPN concentrator
DMZ
VPN concentrator
A VPN is primarily used for which of the following purposes?
Allow the use of network-attached printers
Support secured communications over an untrusted network
Allow remote systems to save on long-distance charges
Support the distribution of public web documents
Support secured communications over an untrusted network
Which VPN implementation uses routers on the edge of each site?
Always-on VPN
Site-to-site VPN
Host-to-host VPN
Remote access VPN
Site-to-site VPN
Which VPN tunnel style routes only certain types of traffic?
Split
Site-to-site
Host-to-host
Full
Split
Which IPSec subprotocol provides data encryption?
AES
SSL
AH
ESP
ESP
In addition to Authentication Header (AH), IPsec is comprised of what other service?
Extended Authentication Protocol (EAP)
Advanced Encryption Standard (AES)
Encapsulating Security Payload (ESP)
Encryption File System (EFS)
Encapsulating Security Payload (ESP)
Which statement BEST describes IPsec when used in tunnel mode?
IPsec in tunnel mode may not be used for WAN traffic
Packets are routed using the original headers, and only the payload is encrypted
The identities of the communicating parties are not protected
The entire data packet, including headers, is encapsulated
The entire data packet, including headers, is encapsulated
Which VPN protocol typically employs IPsec as its data encryption mechanism?
L2F
PPP
L2TP
PPTP
L2TP
Which of the following VPN protocols is no longer considered secure?
TLS
IPsec
PPTP
SSL
PPTP
You are investigating the use of website and URL content filtering to prevent users from visiting certain websites.
Which benefits are the result of implementing this technology in your organization? (Choose two.)
Identification and disposal of infected content
Prevention of phishing attempts
Prevention of emails containing threats
An increase in bandwidth availability
Enforcement of the organization’s internet usage policy
An increase in bandwidth availability
Enforcement of the organization’s internet usage policy
Travis is sending a highly confidential email to Craig that contains sensitive data. Which of the following should Travis implement to ensure that only Craig is able to read the email?
Anti-phishing software
Virus scanner
Encryption
Spam filter
Encryption
Which of the following types of proxies would you use to remain anonymous when surfing the internet?
VPN
Forward
Content filter
Reverse
Forward
As the security analyst for your organization, you have noticed an increase in emails that attempt to trick users into revealing confidential information. Which web threat solution should you implement to protect against these threats?
Anti-phishing software
Proxies
Data loss prevention
Encryption
Anti-phishing software