Chapter 6 Flashcards

1
Q

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

Router

Hub

Virtual private network

SIEM device

A

Router(?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

A bridge will block packets between two different types of networks.

A bridge cannot be used on any Internet connection.

A bridge would block packets from reaching the Internet.

A bridge could permit access to the secure wired network from the unsecured wireless network.

A

A bridge could permit access to the secure wired network from the unsecured wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

Source address

Direction

Date

Protocol

A

Date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?

Internet content filter

Application-based firewall

Reverse proxy

Web security gateway

A

Application-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which function does an Internet content filter NOT perform?

Intrusion detection

URL filtering

Malware inspection

Content inspection

A

Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network address translation (NAT) improve security?

It filters based on protocol.

It discards unsolicited packets.

It masks the IP address of the NAT device.

NATs do not improve security.

A

It discards unsolicited packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?

Once the MAC address table is full the switch functions like a network hub.

A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.

In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.

A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

A

Once the MAC address table is full the switch functions like a network hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which device is easiest for an attacker to take advantage of to capture and analyze packets?

Router

Hub

Switch

Load balancer

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?

Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address

Cause the device to enter a fail-open mode

Record new MAC addresses up to a specific limit

Block the port entirely

A

Cause the device to enter a fail-open mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which statement regarding a demilitarized zone (DMZ) is NOT true?

It can be configured to have one or two firewalls.

It typically includes an email or web server.

It provides an extra degree of security.

It contains servers that are used only by internal network users.

A

It contains servers that are used only by internal network users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement about network address translation (NAT) is true?

It substitutes MAC addresses for IP addresses.

It can be stateful or stateless.

It can be found only on core routers.

It removes private addresses when the packet leaves the network.

A

It substitutes MAC addresses for IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT used in scheduling a load balancer?

The IP address of the destination packet

Data within the application message itself

Round-robin

Affinity

A

The IP address of the destination packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the following configurations are all the load balancers always active?

Active-active

Active-passive

Passive-active-passive

Active-load-passive-load

A

Active-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which device intercepts internal user requests and then processes those requests on behalf of the users?

Forward proxy server

Reverse proxy server

Host detection server

Intrusion prevention device

A

Forward proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?

Split tunnel

Full tunnel

Narrow tunnel

Wide tunnel

A

Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device watches for attacks and sounds an alert only when one occurs?

Firewall

Network intrusion detection system (NIDS)

Network intrusion prevention system (NIPS)

Proxy intrusion device

A

Network intrusion detection system (NIDS)

17
Q

Which of the following is a multipurpose security device?

Hardware security module

Unified Threat Management (UTM)

Media gateway

Intrusion Detection/Prevention (ID/P)

A

Unified Threat Management (UTM)

18
Q

Which of the following CANNOT be used to hide information about the internal network?

Network address translation (NAT)

Protocol analyzer

Subnetter

Proxy server

A

Protocol analyzer

19
Q

What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?

A NIDS provides more valuable information about attacks.

There is no difference; a NIDS and a NIPS are equal.

A NIPS can take actions more quickly to combat an attack.

A NIPS is much slower because it uses protocol analysis.

A

A NIPS can take actions more quickly to combat an attack.

20
Q

Which is the most secure type of firewall?

Stateless packet filtering

Stateful packet filtering

Network intrusion detection system replay

Reverse proxy analysis

A

Stateful packet filtering