Cloud+6 Flashcards
1.Cersei wants to protect the application servers within her cloud deployment by implementing granular control of the traffic and workflows in the deployment. Which of the following would she implement? a. Microsegmentation b. Shadow IT c. DDoS d. Dos
A
2.Joffrey is about to deploy a new web server. He wants to ensure that when a user accesses the server, that their web browsing session is encrypted between the browser and the server. Which of the following should he use with the web server to provide this functionality? a. SSH b. SSL c. TLS d. ACL
C
3.Gilly is walking down the hallway at her office when she notices someone in a delivery uniform carrying boxes down the hall without an escort. She also doesn’t see a visitor’s badge, which is supposed to be clipped to a visitor’s collar. Which of the following might have just occurred?
a. Insufficient security controls and processes
b. Unauthorized physical access
c. Security device failure
d. Weak or obsolete security technologies
B
4.Gendry has been learning more about security within the cloud after hearing that it is a hot topic within the IT industry. He starts reading up on SHA-3 being used for hashing. Which of the following best describes SHA-3? a. Firewall b. Key c. ACL d. Cipher
D
5.Bran has recently learned about the CIA triad. He knows that encryption is important to a variety of things within his organization’s infrastructure. One of those is the ability to ensure that data being transmitted across the network cannot be modified undetected. Which of the following tenets of the CIA triad supports this idea? a. Confidentiality b. Intrusion detection c. Covert d. Integrity
D
6.Podrick wants to implement a technology on the company’s servers that will detect any intrusions as well as implement rules or other methods to immediately stop traffic that appears to be an intrusion. Which of the following is he looking to install? a. HIDS b. HIPS c. NIDS d. NIPS
B
7.Hodor has a VPC that is only accessed by IP address and does not do any DNS lookups for any of the applications that it runs. Which of the following rules should he add to the firewall? a. Deny port 53 b. Deny port 1433 c. Deny port 23 d. Deny port 69
A
8.Tormund has created a set of firewall rules and has noticed that when there is traffic that matches a rule, the traffic allowed in one direction automatically allows traffic in the other direction for an active connection as long as there is at least one message going in either direction within 10 minutes. What is the name of that type of firewall? a. Stateless b. Stateful c. Status-monitoring d. Active-analysis
B
9.Euron has received several complaints that none of the users can access the company’s resources that are hosted on a cloud service provider. The company has a piece of hardware installed that provides a VPN tunnel to the CSP. Upon entering the data center, he sees that all of the lights are off on the device. He unplugs it and plugs it back in and does not see any changes. Which of the following has most likely occurred?
a. Weak or obsolete security technologies
b. Incorrect hardening settings
c. Insufficient security controls and processes
d. Security device failure
D
10.Shae wants to implement antivirus in her cloud environments. Where should she look at installing this protection to be most effective?
a. Inside the DMZ
b. On each host of the network
c. On the e-mail servers
d. All of the other options are correct
D
11.Eddard wants to install a VM running in the perimeter network that provides antivirus/anti-malware capabilities for the rest of the network. Which of the following describes the type of VM that he wants to install? a. NSG b. NVA c. ASG d. NTP
B
12.Jamie is head of security at his company and has gotten an alert from the monitoring system that the web servers are receiving a sudden spike in traffic from a number of foreign IP addresses. This is causing the website to run very slow or return errors to some users. Which of the following is most likely occurring? a. DoS attack b. Ping flood c. DDoS attack d. Smurf attack
C
13.Bronn is examining the log files and notices a constant stream of traffic initializing sessions to an FTP server coming from a single IP address. Which of the following is most likely occurring? a. DoS attack b. Ping flood c. DDoS attack d. Smurf attack
A
14.Sansa has moved the only Linux server within VPC1 to the Linux-only VPC15. The remaining servers in VPC1 all run Windows Server. Which of the following should she do on the firewall for VPC1? a. Disable port 22 b. Disable port 3389 c. Disable port 53 d. Disable port 443
A
15.Theon wants to transfer some files to one of the Linux servers that he manages. Which of the following would ensure that the transmissions are secure while not relying on SSL/TLS for the encryption? a. FTP b. FTPS c. SFTP d. TFTP
C