Chapter 6 Flashcards

Combo: Quiz 6 plus Book End of Chapter Questions

1
Q

Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend?

a. router
b. hub
c. virtual private network
d. SIEM device

A

a. router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how a mail gateway operates?

A

A mail gateway is designed to prevent dangerous emails from being delivered. Most mail gateways operate by monitoring inbound and outbound emails. In the case of inbound emails, a mail gateway searches the content in the email for anything that can be deemeed dangerous (malware, spam, and phishing attacks). In the case of outbounds emails, a mail gateway blocks any data that is sensitive in nature (healthcare records and/or financial data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A firewall that keeps a record of the state of a connection between an internal computer an external device is using what technology below?

a) stateful packet filtering
b) stateless fram filtering
c) stateful frame filtering
d) stateless packet filtering

A

a) stateful packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss the two advantages that NAT provides.

A

One advantage of using NAT is that you can use a NAT router. This device can add an additional layer of security by acting as a firewall by discarding unwanted packets. These discarded packets are denied access because they were not first sent out by the router.

A second advantage of using NAT is that you can mask the IP addressses of internal devices. Without the acutal IP address of the router, it is much more difficult to identify and attack a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between anomaly based monitoring and signature based monitoring?

A

The difference between anomaly based monitoring and signature based monitoring is who the strategy relies on enable it to work correctly. In the case of anomaly monitoring, it relies on the internal behavior of a user or network to make determinations on when to raise an alarm. In contrast, signature based monitoring relies on outside party like and updated database of signatures to make determinations on when to raise an alarm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When VPN network traffic is routing only some traffic over the secure VPN while other traffci directly accesses the Internet, what technology is being used?

a) shared tunneling
b) full tunnel
c) priority tunnel
d) split tunneling

A

d) split tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anomaly monitoring is designed for detecting statistical anomalies.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What vendor neutral protocol implements support for VLAN tagging?

a) VSTP
b) ISL
c) VTP
d) 802.1 Q

A

d) 802.1 Q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What technology enables authorized users to use an unsecured public networks, such as the Internet as if it were a secure private network?

a) VPN
b) endpoint
c) router
d) IKE tunnel

A

a) VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One use of data loss prevention (DLP) is blocking the copying of file to a USB flash drive.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What data unit is associated with Open Systems Interconnection layer two?

a) frame
b) packet
c) segment
d) bit

A

a) frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization’s secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia?

a. A bridge will block packets between two different types of networks.
b. A bridge cannot be used on any Internet connection.
c. A bridge would block packets from reaching the Internet.
d. A bridge could permit access to the secure wired network from the unsecured wireless network.

A

d. A bridge could permit access to the secure wired network from the unsecured wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these would NOT be a filtering mechanism found in a firewall ACL rule?

a. Source address
b. Direction
c. Date
d. Protocol

A

c. Date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following devices can identify the application that send packets and then make decisions about filtering based on it?

a. Internet content filter
b. Application-based firewall
c. Reverse proxy
d. Web security gateway

A

b. Application-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which function does an Internet content filter NOT perform?

a. Intrusion detection
b. URL filtering
c. Malware inspection
d. Content inspection

A

a. Intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does network address translation (NAT) improve security?

a. It filters based on protocol.
b. It discards unsolicited packets.
c. It masks the IP address of the NAT device.
d. NATs do not improve security.

A

b. It discards unsolicited packets.

17
Q

Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say?

a. Once the MAC address table is full the switch functions like a network hub.
b. A MAC flooding attack with filter to the local host computer’s MAC-to-IP address tables and prevent these hosts from reaching the network.
c. In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic.
d. A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

A

a. Once the MAC address table is full the switch functions like a network hub.

18
Q

Which of the following devices is easiest for an attacker to take advantage of in order to capture and analyze packets?

a. Router
b. Hub
c. Switch
d. Load Balancer

A

b. Hub

19
Q

Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian?

a. Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address
b. Cause the device to enter a fail-open mode.
c. Record new MAC addresses up to a specific limit
d. Block the port entirely

A

b. Cause the device to enter a fail-open mode.

20
Q

Which statement regarding a demilitarized zone (DMZ) is NOT true?

a. It can be configured to have one or two firewalls.
b. It typically includes an email or web server.
c. It provides an extra degree of security.
d. It contains servers that are used only by internal network users.

A

d. It contains servers that are used only by internal network users.

21
Q

Which statement about network address translation (NAT) is true?

a. It substitutes MAC addresses for IP addresses.
b. It can be stateful or stateless.
c. It can be found only on core routers.
d. It removes private addresses when the packet leaves the network.

A

d. It removes private addresses when the packet leaves the network.

22
Q

Which of these is NOT used in scheduling a load balancer?

a. The IP address of the destination packet
b. Data within the application message itself
c. Round-robin
d. Affinity

A

a. The IP address of the destination packet

23
Q

In which of the following configurations are all the load balancers always active?

a. Active-active
b. Active-passive
c. Passive-active-passive
d. Active-load-passive-load

A

a. Active-active

24
Q

Which device intercepts internal user requests and then processes those requests on behalf of the users?

a. Forward proxy server
b. Reverse proxy server
c. Host detection server
d. Intrusion prevention device

A

a. Forward proxy server

25
Q

Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose?

a. Split tunnel
b. Full tunnel
c. Narrow tunnel
d. Wide tunnel

A

a. Split tunnel

26
Q

Which device watches for attacks and sounds an alert only when one occurs?

a. Firewall
b. Network intrusion detection system (NIDS)
c. Network intrusion prevention system (NIPS)
d. Proxy intrusion device

A

b. Network intrusion detection system (NIDS)

27
Q

Which of the following is a multipurpose security device?

a. Hardware security module
b. Unified Threat Management (UTM)
c. Media gateway
d. Intrusion Detection/Prevention (ID/P)

A

b. Unified Threat Management (UTM)

28
Q

Which of the following CANNOT be used to hide information about the internal network?

a. Network address translation (NAT)
b. Protocol analyzer
c. Subnetter
d. Proxy server

A

b. Protocol analyzer

29
Q

What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)?

a. A NIDS provides more valuable information about attacks.
b. There is no difference; a NIDS and a NIPS are equal.
c. A NIPS can take actions more quickly to combat an attack.
d. A NIPS is much slower because it uses protocol analysis.

A

c. A NIPS can take actions more quickly to combat an attack.

30
Q

Which is the most secure type of firewall?

a. Stateless packet filtering
b. Stateful packet filtering
c. Network intrusion detection system replay
d. Reverse proxy analysis

A

b. Stateful packet filtering