CIS 444 exam 2 (final) Flashcards
computer information systems
The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?
Between the Internet access router and the rest of the private internetwork
Anywhere on the private internetwork, as long as the Internet is accessible
At the ISP’s network site
Between the Internet access router and the Internet Service Provider’s (ISP’s) network
Between the Internet access router and the rest of the private internetwork
VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?
Hubs
Domains
Bridges
Routers
Routers
Which of the following statements about hubs and switches are true?
All of the devices connected to a hub are not part of a single collision domain.
Hubs operate at the physical layer, whereas switches operate at the network layer.
Switches create a separate broadcast domain for each connected device, whereas hubs create a single broadcast domain for all of the connected devices.
There are switches available with network layer functionality, but there are no hubs with that capability
There are switches available with network layer functionality, but there are no hubs with that capability
When a packet collision between two systems occurs on an Ethernet network, Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) causes the two systems to stop transmitting and generate a jam signal. After sending the jam signal, why do the two systems wait for a randomized backoff interval before retransmitting their packets?
They need to rebuffer the packet.
To recalculate the packets’ checksum values.
To prevent another collision from occurring.
They need time to reassemble the packets
To prevent another collision from occurring.
Ralph is a freelance network consultant installing a three-node small business network. The computers are all in the same room and use wired Ethernet to connect to the switched ports of a multifunction device. The device also functions as a Network Address Translation (NAT) router for a cable modem connection to the Internet. NAT provides a measure of security, but Ralph wants to be sure that the network is protected from unauthorized Internet traffic and attacks against open ports. Which of the following solutions would enable Ralph to accomplish this goal with the minimum cost to the client?
Install a hardware firewall between the multifunction device and the cable modem.
Install an Intrusion Prevention System (IPS) between the multifunction device and the cable modem.
Install a personal firewall on each of the computers.
Connect an Intrusion Detection System (IDS) to one of the switched ports in the multifunction device
Install a personal firewall on each of the computers.
Each of the following Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) events occurs on an Ethernet network when two stations transmit simultaneously, although not in the order listed. Which of the following events occurs immediately after the collision?
The two stations transmit a jam signal.
The two stations observe a random backoff interval.
The two stations begin retransmitting their frames.
The two stations stop transmitting
The two stations stop transmitting
Network Address Translation (NAT) operates at which layer of the Open Systems Interconnection (OSI) model?
Data link
Transport
Network
Application
Network
Which of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?
Dynamic routing
QoS
Port forwarding
VLANs
QoS
The jumbo frame capability is associated with which networking protocol?
Transmission Control Protocol (TCP)
Internet Protocol (IP)
Point-to-Point Protocol (PPP)
Ethernet
Ethernet
Control plane policing (CPP or CoPP) is a feature on some routers and switches that limits the rate of traffic on the device’s processor, to prevent Denial-of-Service (DoS) and reconnaissance attacks, using which of the following technologies?
IPSec
802.1X
RA Guard
QoS
QoS
Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?
512
1024
1518
1500
1500
Some networks are designed with a switching fabric that contains redundant paths, for fault tolerance purposes. However, in this type of design, it is possible for packets to circulate endlessly around the network, which is called a switching loop. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?
STP
RIP
VLAN
NAT
STP
Which of the following are terms for an area of an enterprise network, separated by firewalls, which contains servers that must be accessible both from the Internet and from the internal network?
EGP
Stateless network
DMZ
Intranet
DMZ
Which of the following are mechanisms by which IPv6 traffic can be transmitted on an IPv4 network through the use of tunneling?
FTP
Teredo
IPsec
ICMPv6
Teredo
Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses?
UTM appliance
Switch
NAT router
RADIUS server
NAT router
Ralph has been hired by a company to redesign its Local Area Network (LAN). Right now, it has a single 100 Mbps Ethernet LAN with 40 users and 2 shared servers, all connected through 3 hubs. The users on the network must be able to share files with one another and also access the shared servers. The users are complaining that the network is too slow. Management states that cost is a factor that must be considered. Which of the following upgrade scenarios should Ralph recommend in this situation?
Split the network into smaller segments with dedicated hubs as opposed to shared hubs.
Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.
Split the network into two routed LANs with 20 users each.
Replace the hubs with a layer 3 switch and define two Virtual LANs (VLANs) with 20 users each.
Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.
Which of the following best defines the concept of the dual stack?
A computer with connections to two different network segments
A computer with two network interface adapters
A computer with two sets of networking protocols
A computer with two installed operating systems
A computer with two sets of networking protocols
Which of the following terms is used to describe the method by which a firewall examines the port numbers in transport layer protocol headers?
IP address filtering
Service-dependent filtering
Deep Packet Inspection (DPI)
Next-Generation Firewall (NGFW)
Service-dependent filtering
Which of the following physical network devices can conceivably be implemented as software in a computer’s operating system?
Hub
Transceiver
Firewall
Switch
Firewall
Which of the following is not a method of traffic shaping?
Rate limiting
Bandwidth throttling
Self-limiting
WAN optimization
WAN optimization
Which of the following Virtual Private Network (VPN) protocols does not provide encryption within the tunnel?
IPSec
PPTP
SSL
L2TP
L2TP
Which of the following is the best description of geofencing?
Somewhere you are
Something you have
Something you know
Something you do
Somewhere you are
Social engineering has become an increasingly serious problem on your company network. Which of the following is an effective method for preventing sensitive data from being compromised through social engineering?
Use IPSec to encrypt all network traffic.
Install an antivirus software product on all user workstations.
Install a firewall between the internal network and the Internet.
Implement a program of user education and corporate policies.
Implement a program of user education and corporate policies.
In which of the following ways is VLAN hopping a potential threat?
VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.
VLAN hopping enables an attacker to rename the default VLAN on a switch.
VLAN hopping enables an attacker to scramble a switch’s patch panel connections.
VLAN hopping enables an attacker to change the native VLAN on a switch.
VLAN hopping enables an attacker to access different VLANs using 802.1q spoofing.
Which of the following security protocols used to protect traffic exchanged by web browsers and servers was created first?
DTLS
SSL
SSH
TLS
SSL
Which of the following types of systems are frequently used to collect information from Intrusion Detection Systems (IDSs)?
NGFW
VoIP
RADIUS
SIEM
SIEM
Which of the following network devices does not employ Access Control Lists (ACLs) to restrict access?
Hubs
Switches
Routers
Wireless Access Points (WAPs)
Hubs
A user swipes a smartcard through the reader connected to a laptop and then types a password to log on to the system. Which of the following actions is the user performing?
Auditing
Authorization
Authentication
Accounting
Authentication
At which layer of the Open Systems Interconnection (OSI) reference model does Dynamic Host Configuration Protocol (DHCP) snooping operate?
Network
Transport
Data link
Application
Data link
In the hacker subculture, which of the following statements best describes a zombie?
A program that attackers use to penetrate passwords using brute-force attacks
A user that has fallen victim to a phishing attack
A computer that is no longer functioning because it is the target of a Denial-of-Service (DoS) attack
A computer that is remotely controllable because it has been infected by malware
A computer that is remotely controllable because it has been infected by malware
In a client-to-site Virtual Private Network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?
Two workstations
Two VPN concentrators
A workstation and a server
A workstation and a VPN concentrator
A workstation and a VPN concentrator
Which of the following security protocols for web servers or browsers was deprecated in 2015 in favor of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)?
SSL
SSH
IPsec
RDP
SSL
Dynamic ARP Inspection (DAI) is a feature in some network switches that prevents on-path (man-in-the-middle) attacks facilitated by Address Resolution Protocol (ARP) poisoning, the deliberate insertion of fraudulent information into the ARP cache. A switch with DAI inspects incoming ARP packets and rejects those that contain incorrect pairs of IP and Media Access Control (MAC) addresses. Which of the following is the means by which the switch compiles a table of the correct ARP information for comparison with the incoming packets?
Secure SNMP
DNS name resolution
DHCP snooping
NDP
DHCP snooping
Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?
NGFW
Hub
IDS
NAS
NAS
Alice is implementing a new password policy that requires all users to change their passwords every seven days. What further modification can she make to the password policy to prevent users from thwarting the password change requirement?
Require the creation of unique passwords
Require the use of special characters
Specify a maximum password change interval
Specify a minimum password length
Require the creation of unique passwords
You are working at a client site with a managed router that includes a console port for administrative access, which you can use to connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?
BYOD
Client-to-site
In-band
Out-of-band
Out-of-band
Which of the following types of Virtual Private Network (VPN) connection is the best solution for allowing clients limited access to your corporate network?
Host-to-host
Extranet
Host-to-site
Site-to-site
Extranet
When starting her new position as a network administrator, Alice was given two user accounts. One account is intended for standard user activities, and another has the additional permissions needed for Alice to perform administrative tasks. This is an example of which of the following security concepts?
Defense in depth
Multifactor authentication
Least privilege
Zero
Least privilege
Combining elements like something you know, something you have, and something you are to provide access to a secured network resource is a definition of which of the following types of authentication?
Multifactor
Multimetric
Multisegment
Multifiltered
Multifactor
Password policies frequently require users to specify complex passwords. Which of the following are characteristic of a complex password?
Passwords that do not duplicate the user’s account name, birth date, or other personal information
Passwords that contain mixed upper- and lowercase letters, numbers, and symbols
Passwords that exceed a specific length
Passwords that do not duplicate a specific number of the user’s previous passwords
Passwords that contain mixed upper- and lowercase letters, numbers, and symbols
Which of the following Virtual Private Network (VPN) protocols is generally considered to be obsolete?
L2TP
IPSec
SSL/TLS
PPTP
PPTP
Which of the following terms refers to a Denial-of-Service (DoS) attack that involves zombies?
Permanent
Amplified
Reflective
Distributed
Distributed
Which of the following services are methods of tracking a user’s activities on a network?
Accounting
Authentication
Authorization
Access control
Accounting
Which of the following prefixes must you use in the URL you type into a web browser when the website you want to access has been secured with Transport Layer Security (TLS)?
HTTP://
TLS://
HTTPS://
HTLS://
HTTPS://
Which of the following statements best describes a ransomware attack?
A website is rendered inaccessible by a Denial-of-Service (DoS) attack until its owner agrees to pay a fee.
A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.
A user’s access to a specific resource, such as a bank’s website, is blocked until the user pays a fee.
An application is supplied with limited usability until the user pays a license fee.
A message appears on a user’s screen, stating that system is locked and will only be released on payment of a fee.
Which of the following technologies can maintain an account database that multiple remote access servers can employ to authenticate remote users?
RADIUS
NAS
NGFW
IDS
RADIUS
You have just received notification of a new software release for an application you are running on your servers. The release is intended to address a newly discovered security vulnerability. Which of the following is the correct term for a software release containing a fix designed to address one specific issue?
A service pack
An upgrade
An update
A patch
A patch
In a host-to-host Virtual Private Network (VPN) connection, which of the following combinations of endpoint devices would most likely be involved?
A workstation and a server
Two workstations
A workstation and a VPN concentrator
Two VPN concentrators
Two workstations
Which of the following terms refers to the process by which a system tracks a user’s network activity?
Authorization
Access control
Authentication
Accounting
Accounting
Ed receives an email through his personal account, warning him that his checking account has been locked due to excessive activity. To confirm that the activity is fraudulent, the email instructs Ed to click the enclosed hyperlink, log on to his account, and review the list of charges. Ed clicks the link and is taken to a web page that appears to be that of his bank. He then supplies his username and password to log on. Which of the following types of attacks is Ed likely to be experiencing?
Social engineering
Phishing
Spoofing
Logic bomb
Phishing
Which of the following are not considered to be Denial-of-Service (DoS) attacks?
An attacker connects a rogue access point to a company’s wireless network, using their Service Set Identifier (SSID) in the hope of attracting their users.
An attacker uses the
An intruder breaks into a company’s datacenter and smashes their web servers with a sledgehammer.
An attacker captures the packets transmitted only from a domain controller to obtain encrypted passwords.
An attacker connects a rogue access point to a company’s wireless network, using their Service Set Identifier (SSID) in the hope of attracting their users.
Which of the following types of Virtual Private Network (VPN) connection is the best solution for connecting a home user to a corporate network?
Extranet
Host-to-site
Host-to-host
Site-to-site
Host-to-site
In most cases, a Denial-of-Service (DoS) attack refers to a deliberate attempt to overwhelm a server with incoming traffic. However, this is not always the case. Which of the following types of DoS attacks does not involve flooding a server with traffic?
Distributed
Amplified
Permanent
Reflective
Permanent
Which of the following standards defines a framework for the authentication process, but does not specify the actual authentication mechanism?
TLS
WPA
TKIP
EAP
EAP
Regularly applying operating system updates and patches to network computers is an important mitigation procedure for which of the following security problems?
Port security
Denial-of-Service attacks
Social engineering
Malware
Malware
A server’s firewall is configured using a default policy that does not allow any users remote access to the server unless an administrator creates a rule granting them access. Which of the following terms describes this default policy?
Explicit deny
Explicit allow
Implicit deny
Implicit allow
Implicit deny
Which of the following is not a means of preventing physical security breaches to a network datacenter?
Badges
Tailgaters
Key fobs
Locks
Tailgaters
A multifactor authentication system consists of at least two different identifying criteria, typically falling into two of the following categories: something you have, something you do, something you know, and something you are. Which of the following authentication factors is an example of something you have?
A finger gesture
A smartcard
A password
A fingerprint
A smartcard
A senior IT administrator at your company was terminated two weeks ago. Today, Friday, you arrived at the office and found that all of the hosts in the web server farm had had their data deleted. There are no unauthorized entries to the datacenter recorded, but you suspect the terminated administrator is responsible for deleting the data. Which of the following attack types might the administrator have directed at the web server farm?
Social engineering
ARP poisoning
Logic bomb
Evil twin
Logic bomb
Many managed switches and routers include a console port for administrative access, to which you can connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?
Out-of-band
BYOD
In-band
Client-to-site
Out-of-band
When designing a wireless LAN installation, what is a valid reason to install a unidirectional antenna in an Access Point (AP), rather than an omnidirectional one?
A unidirectional antenna can be focused to a specific signal pattern width.
All of the above
There are many interior walls between the AP and the most distant workstation.
The AP will be located against an outside wall.
All of the above
Alice is attempting to deploy an IEEE 802.11b/g wireless LAN on the fifth floor of a 10-story office building that is surrounded on all sides by other office buildings, all of which seem to be running many wireless LANs. Scanning the 2.4 GHz band, she sees literally dozens of networks, spread across all of the available channels. As a result, her wireless devices have trouble connecting to their Access Point (AP), and when they do, they achieve only low speeds. Which task should Alice perform to enable the wireless clients to connect to the network more reliably?
Configure all of the network devices to use WPA2 encryption with AES.
Upgrade all of the network devices to the latest firmware.
Configure the AP to suppress SSID broadcasts.
Upgrade all of the wireless network devices to IEEE 802.11n.
Upgrade all of the wireless network devices to IEEE 802.11n.
Which of the following is the maximum theoretical download speed for a 5G cellular network?
150 megabits per second
42 megabits per second
1 gigabit per second
10 gigabits per second
10 gigabits per second
Which of the following encryption protocols was introduced in the WiFi Protected Access (WPA) wireless security standard?
CCMP-AES
TACACS+
TKIP
EAP-TLS
TKIP
Which of the following wireless LAN security protocols was rendered obsolete after it was found to be extremely easy to penetrate?
WEP
WPA
WPA2
EAP
WEP
Ralph is having trouble providing satisfactory wireless network performance to some executive offices at the far end of the building. The wireless Access Point (AP) is based on the 802.11g standard. The offices have heavy doors and insulated walls for sound dampening, and the occupants typically leave their doors closed during work hours. Which of the following actions can Ralph take to provide the users in these offices with better wireless network performance?
Install an additional AP nearer to the offices.
Upgrade the AP to a model based on the 802.11n standard.
Modify the AP to use higher number channels.
Configure the AP to disable SSID broadcasting.
Install an additional AP nearer to the offices.
How does Media Access Control (MAC) address filtering increase the security of a Wireless Local Area Network (WLAN)?
By allowing traffic sent to or from specific MAC addresses through the Internet firewall
By substituting registered MAC addresses for unregistered ones in network packets
By permitting only devices with specified MAC addresses to connect to an access point
By preventing access points from broadcasting their presence
By permitting only devices with specified MAC addresses to connect to an access point
CCMP-AES is an encryption protocol used with which of the following wireless network security standards?
WPA
WEP
EAP
WPA2
WPA2
Alice is a consultant working in your office, who has been given the Secure Set Identifier (SSID) and the passphrase for the company’s main wireless network, but she is unable to connect with her laptop. Which of the following security measures might be preventing her from connecting?
Disabling SSID broadcast
Geofencing
MAC filtering
Using WPA2
MAC filtering
A Wireless Access Point (WAP) enables computers equipped with wireless network interface adapters to function in which of the following topologies?
Ad hoc
Bus
Star
Infrastructure
Infrastructure
At which layer of the Open Systems Interconnection (OSI) model do wireless range extenders operate?
Network
Physical
Transport
Data link
Physical
Which of the following can be described as a wireless network hardening technique?
Encryption
Social engineering
Deauthentication
MAC addressing
Encryption
Ed has installed a separate 802.11n wireless network for guest users working in his company’s offices. The guest network is unsecured, and Ed has recently become aware that people outside the building are able to access it. It is not possible to move the Access Point (AP), and it must run at maximum power to reach the entire building. Which of the following is the most convenient way to prevent users outside the building from accessing the guest network while leaving it available to users inside the building?
Disable SSID broadcasting
Switch the network frequency
Change the passphrase daily
Implement MAC filtering
Disable SSID broadcasting
Alice is trying to provide users in a warehouse with wireless network connectivity for their tablets. The warehouse is a huge concrete structure with many internal cinderblock walls. Which of the following types of signal interference are inhibiting Alice’s efforts?
Reflection
Refraction
Absorption
Diffraction
Absorption
Which of the following wireless security protocols was substantially weakened by its initialization vector?
WEP
WPA
PEAP
WPA2
WEP
Which of the following topologies enables wireless devices to access resources on a wired network?
Star
Ad hoc
Infrastructure
Bus
Infrastructure
CCMP is based on which of the following encryption standards?
802.1X
RC4
TKIP
AES
AES
Which of the following wireless LAN standards include the ability to use Multiple Input, Multiple Output (MIMO) antennae?
IEEE 802.11g
IEEE 802.11b
IEEE 802.11a
IEEE 802.11n
IEEE 802.11n
Which of the following components are required for two computers to communicate using an IEEE 802.11 wireless LAN in an ad hoc topology?
A router connected to the Internet
A Wireless Access Point (WAP)
An external antenna
None of the above
None of the above
You are deploying an 802.11n wireless network for a client that is asking for the best possible security you can provide without deploying additional servers. When setting up the Wireless Access Point (WAP), you disable Service Set Identifier (SSID) broadcasts, select WiFi Protected Access with Pre-Shared Keys (WPA-PSKs), and configure Media Access Control (MAC) address filtering. Which of the following statements about the security of this arrangement is true?
You should not use MAC address filtering since it exposes MAC addresses to possible attacks.
You should not disable SSID broadcasts since this prevents users from connecting to the network.
You should use WiFi Protected Access II (WPA2) instead of WPA, since it is more resistant to certain types of attacks.
The configuration is as secure as you can make it with the specified equipment
You should use WiFi Protected Access II (WPA2) instead of WPA, since it is more resistant to certain types of attacks.
Which of the following wireless security protocols uses CCMP-AES for encryption?
WPA2
WEP
WPA
TKIP
WPA2
Ralph is installing a wireless LAN that includes three Access Points (APs) to provide coverage for a large building. What must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices?
Configure each AP with the same IP address.
Configure each AP with the same security passphrase.
Configure each AP with different SSIDs.
Configure each AP to use different security protocols
Configure each AP with the same security passphrase.
Which of the following is the fastest speed achievable by a wireless LAN using the currently ratified IEEE 802.11 standards?
600 Mbps
1.3 Gbps
2.6 Gbps
54 Mbps
1.3 Gbps
Which form of the WiFi Protected Access (WPA) and WPA2 protocols require a RADIUS server?
WPA-Local
WPA-Personal
WPA-PSK
WPA-Enterprise
WPA-Enterprise
Which of the following wireless networking standards is capable of supporting speeds of 54 Mbps and is also backward compatible with IEEE 802.11b?
Bluetooth
IEEE 802.11n
IEEE 802.11g
IEEE 802.11a
IEEE 802.11g
On a wireless network, which of the following best describes an example of a captive portal?
A series of two doors with an intervening airlock through which people must pass before they can enter a secured space
A web page with which a user must interact before being granted access to a wireless network
A web page stating that the data on a user’s computer has been locked and will only be unlocked after payment of a fee
A dedicated switch port used to connect to other switches
A web page with which a user must interact before being granted access to a wireless network
Upgrading a wireless network from the Wired Equivalent Privacy (WEP) security protocol to WiFi Protected Access (WPA) enables it to use the Temporal Key Integrity Protocol (TKIP) for encryption, which generates a unique key for each packet. Which of the following types of attacks does this capability prevent?
Deauthentication attacks
Replay attacks
Brute-force attacks
Denial-of-Service (DoS) attacks
Replay attacks