Chapter 7 Flashcards

1
Q

Which Domain Name System (DNS) attack replaces a fraudulent IP address for a symbolic name?

A. DNS forwarding

B. DNS Masking

C. DNS replay

D. DNS Poisoning

A

D. DNS Poisoning (hacker technique that manipulates known vulnerabilities within the domain name system (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Aideen sent an email to her supervisor explaining the Domain Name System Security Extensions (DNSSEC). Which of the following statements would Aideen have NOT included in her email?

A. It can prevent a DNS transfer attack.

B. It is fully supported in BIND9.

C. It adds message header information.

D. It adds additional resource records.

A

A. It can prevent a DNS transfer attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What functions of a switch does a software defined network separate?

A. Host and virtual

B. Control plane and physical plane

C. Network level and resource level

D. RAM and hard drive

A

B. Control plane and physical plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DNSSEC adds additional _____ and message header information, which can be used to verify that the requested data has not been altered in transmission.

A. resource records

B. hash sequences

C. zone transfers

D. field flags

A

A. resource records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following TCP/IP protocols do not relate to security?

A. IP

B. HTTPS

C. FTP

D. SNMP

A

A. IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is NOT correct about an SSL/TLS accelerator?

A. It is a separate hardware card that inserts into a web server.

B. It contains one or more co-processors to handle SSL/TLS processing.

C. It can be installed as a “virtual SSL/TLS server” alongside a forward proxy server.

D. It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting “on top” of SSL/TLS.

A

D. It replaces FTP using Secure Sockets Layer (FTPS) as a file transport layer resting “on top” of SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most secure protocol for transferring files?

A

D. SFTP (SSH File Tranfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be used to prevent a buffer overflow attack?

A

A. DEP (Date Execution Prevention) protects certain pages or regions of memory from executing malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of device log contains the most beneficial security data?

A

B. firewall log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a security concern of virtualized environments?

A. Physical security appliances are not always designed to protect virtual systems.

B. Virtual machines must be protected from both the outside world and from other virtual machines on the same physical computer.

C. Virtual servers are less expensive than their physical counterparts.

D. Live migration can immediately move one virtualized server to another hypervisor.

A

C. Virtual servers are less expensive than their physical counterparts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of cloud is offered to specific organizations that have common concerns?

A

C. community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of log can provide details regarding requests for specific files on a system?

A

C. access log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which application stores the user’s desktop inside a virtual machine that resides on a server and is accessible from multiple locations?

A. Application cell

B. VDI

C. Container

D. VDE

A

B. VDI ( virtual desktop infrastructure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the recommended secure protocol for voice and video applications?

A

C. Secure Real-time Transport Protocol (SRTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Catriona needed to monitor network traffic. She did not have the resources to install an additional device on the network. Which of the following solutions would meet her needs?

A. Correlation engine

B. Aggregation switch

C. Port mirroring

D. Network tap

A

C. Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a service model in cloud computing?

A. Software as a Service (SaaS)

B. Platform as a Service (PaaS)

C. Hardware as a Service (HaaS)

D. Infrastructure as a Service (IaaS)

A

C. Hardware as a Service (HaaS)

17
Q

Eachna is showing a new security intern the log file from a firewall. Which of the following entries would she tell him do not need to be investigated?

A. successful logins

B. suspicious outbound connections

C. IP addresses that are being rejected and dropped

D. Probes to obscure port numbers

A

A. successful logins

18
Q

Which version of Simple Network Management Protocol (SNMP) is considered the most secure?

A

B. SNMPv3

19
Q

Which type of hypervisor does not run on an underlying operating system?

A. Type III

B. Type IV

C. Type I

D. Type II

A

C. Type I

20
Q

Kyle asked his supervisor which type of computing model was used when the enterprise first started. She explained that the organization purchased all the hardware and software necessary to run the company. What type of model was she describing to Kyle?

A. Off-premises

B. Hosted services

C. On-premises

D. Virtual services

A

C. On-premises