Chapter 6 Flashcards
Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
Router
Hub
Virtual private network
SIEM device
Router(?)
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
A bridge will block packets between two different types of networks.
A bridge cannot be used on any Internet connection.
A bridge would block packets from reaching the Internet.
A bridge could permit access to the secure wired network from the unsecured wireless network.
A bridge could permit access to the secure wired network from the unsecured wireless network.
Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
Source address
Direction
Date
Protocol
Date
Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?
Internet content filter
Application-based firewall
Reverse proxy
Web security gateway
Application-based firewall
Which function does an Internet content filter NOT perform?
Intrusion detection
URL filtering
Malware inspection
Content inspection
Intrusion detection
How does network address translation (NAT) improve security?
It filters based on protocol.
It discards unsolicited packets.
It masks the IP address of the NAT device.
NATs do not improve security.
It discards unsolicited packets.
Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?
Once the MAC address table is full the switch functions like a network hub.
A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.
In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.
A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.
Once the MAC address table is full the switch functions like a network hub.
Which device is easiest for an attacker to take advantage of to capture and analyze packets?
Router
Hub
Switch
Load balancer
Hub
Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?
Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address
Cause the device to enter a fail-open mode
Record new MAC addresses up to a specific limit
Block the port entirely
Cause the device to enter a fail-open mode
Which statement regarding a demilitarized zone (DMZ) is NOT true?
It can be configured to have one or two firewalls.
It typically includes an email or web server.
It provides an extra degree of security.
It contains servers that are used only by internal network users.
It contains servers that are used only by internal network users.
Which statement about network address translation (NAT) is true?
It substitutes MAC addresses for IP addresses.
It can be stateful or stateless.
It can be found only on core routers.
It removes private addresses when the packet leaves the network.
It substitutes MAC addresses for IP addresses.
Which of these is NOT used in scheduling a load balancer?
The IP address of the destination packet
Data within the application message itself
Round-robin
Affinity
The IP address of the destination packet
In which of the following configurations are all the load balancers always active?
Active-active
Active-passive
Passive-active-passive
Active-load-passive-load
Active-active
Which device intercepts internal user requests and then processes those requests on behalf of the users?
Forward proxy server
Reverse proxy server
Host detection server
Intrusion prevention device
Forward proxy server
Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?
Split tunnel
Full tunnel
Narrow tunnel
Wide tunnel
Split tunnel