Chapter 6 Flashcards

1
Q

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?
A. router
B. hub
C. virtual private network
D. SIEM device

A

A. router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?
A. A bridge will block packets between two different types of networks.
B. A bridge cannot be used on any Internet connection.
C. A bridge would block packets from reaching the Internet.
D. A bridge could permit access to the secure wired network from the unsecured wireless network

A

D. A bridge could permit access to the secure wired network from the unsecured wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?
A. source address
B. direction
C. date
D. protocol

A

C. date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?
A. Internet content filter
B. application-based firewall
C. reverse proxy
D. web security gateway

A

B. application-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which function does an Internet content filter NOT perform?
A. intrusion detection
B. URL filtering
C. malware inspection
D. content inspection

A

A. intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does network address translation (NAT) improve security?
A. It filters based on protocol.
B. It discards unsolicited packets.
C. It masks the IP address of the NAT device.
D. NATs do not improve security.

A

B. It discards unsolicited packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?
A. Once the MAC address table is full the switch functions like a network hub.
B. A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.
C. In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.
D. A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

A

A. Once the MAC address table is full the switch functions like a network hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which device is easiest for an attacker to take advantage of to capture and analyze packets?
A. router
B. hub
C. switch
D. load balancer

A

B. hub (enables mulitople devices or connections to a computer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?
A. Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address
B. Cause the device to enter a fail-open mode.
C. Record new MAC addresses up to a specific limit
D. Block the port entirely

A

Cause the device to enter a fail-open mode. (allows the network access to the back-end servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which statement regarding a demilitarized zone (DMZ) is NOT true?
A. It can be configured to have one or two firewalls.
B. It typically includes an email or web server.
C. It provides an extra degree of security.
D. It contains servers that are used only by internal network users.

A

It contains servers that are used only by internal network users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement about network address translation (NAT) is true?
A. It substitutes MAC addresses for IP addresses.
B. It can be stateful or stateless.
C. It can be found only on core routers.
D. It removes private addresses when the packet leaves the network.

A

It removes private addresses when the packet leaves the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT used in scheduling a load balancer?
A. The IP address of the destination packet
B. Data within the application message itself
C. Round-robin
D. Affinity

A

A. The IP address of the destination packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the following configurations are all the load balancers always active?
A. Active-active
B. Active-passive
C. Passive-active-passive
D. Active-load-passive-load

A

A. Active-active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which device intercepts internal user requests and then processes those requests on behalf of the users?
A. Forward proxy server
B. Reverse proxy server
C. Host detection server
D. Intrusion prevention device

A

A. Forward proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?
A. Split tunnel
B. Full tunnel
C. Narrow tunnel
D. Wide tunnel

A

A. Split tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which device watches for attacks and sounds an alert only when one occurs?
A. firewall
B. network intrusion detection system (NIDS)
C. network intrusion prevention system (NIPS)
D. proxy intrusion device

A

B. network intrusion detection system (NIDS)

17
Q

Which of the following is a multipurpose security device?
A. Hardware security module
B. Unified Threat Management (UTM)
C. Media gateway
D. Intrusion Detection/Prevention (ID/P)

A

B. Unified Threat Management (UTM)

18
Q

Which of the following CANNOT be used to hide information about the internal network?
A. network address translation (NAT)
B. a protocol analyzer
C. a subnetter
D. a proxy server

A

B. a protocol analyzer

19
Q

What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?
A. A NIDS provides more valuable information about attacks.
B. There is no difference; a NIDS and a NIPS are equal.
C. A NIPS can take actions more quickly to combat an attack.
D. A NIPS is much slower because it uses protocol analysis.

A

C. A NIPS can take actions more quickly to combat an attack.

20
Q

Which is the most secure type of firewall?
A. stateless packet filtering
B. stateful packet filtering
C. network intrusion detection system replay
D. reverse proxy analysis

A

B. stateful packet filtering