CompTIA Security+ Get Certified Get Ahead - CH3 Review Flashcards

1
Q

An outside consultant performed an audit of the Municipal House of Pancakes Network. She identified a legacy protocol being used to access browser-based interfaces on Switches and Routers within the Network. She recommended replacing the legacy protocol with a Secure Protocol to access these Network devices using the same interface. Which of the following protocols should be implemented?

Newest fully supported version of SSL.
Newest fully supported version of TLS
Newest fully supported version of LDAPS
Newest fully supported version of SNMP

A

Newest fully supported version of TLS (Transport Layer Security)

Explanation:
The newest version of Transport Layer Security (TLS) should be implemented to access the network devices. Because the scenario says the same interface is needed, the only possible choices are TLS or Secure Sockets Layer (SSL).

However, SSL has been deprecated and should not be used.
Lightweight Directory Access Protocol Secure (LDAPS) is used to communicate with directories such as Microsoft Active Directory.
Simple Network Management Protocol version 3 (SNMPv3) adds security to SNMP and encrypts the credentials sent to and from the network devices, but it doesn’t support access via a browser interface.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 369-370). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your organization’s Security policy requires that confidential data transferred over the internal Network must be Encrypted. Which of the following protocols would BEST meet this requirement?

FTP
SSH
SNMPv3
SRTP

A

SSH (Secure Shell)

Explanation:
You can use Secure Shell (SSH) to encrypt confidential data when transmitting it over the network.

Secure File Transfer Protocol (SFTP) uses SSH to encrypt File Transfer Protocol (FTP) traffic, but FTP is unencrypted.
Simple Network Management Protocol version 3 (SNMPv3) is used to monitor and manage network devices, not transmit data over a network.
Secure Real-Time Transport Protocol (SRTP) provides encryption, message authentication, and integrity for voice and video, but not all data.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 370). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maggie needs to collect Network device configuration information and Network statistics from devices on the Network. She wants to protect the confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need?

SSH
FTPS
SNMPv3
TLS

A

SNMPv3 (Simple Network Management Protocol v3)

Explanation:
Simple Network Management Protocol version 3 (SNMPv3) is a secure protocol that can monitor and collect information from network devices. It includes strong authentication mechanisms to protect the confidentiality of credentials. None of the other protocols listed are used to monitor network devices.

Secure Shell (SSH) provides a secure method of connecting to devices but does not monitor them.
File Transfer Protocol Secure (FTPS) is useful for encrypting large files in transit, using Transport Layer Security (TLS).
TLS is commonly used to secure transmissions but doesn’t include methods to monitor devices.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 370). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are trying to determine what information attackers can gain about your organization using Network reconnaissance methods via the Internet. Using a public Wireless hot spot, you issue the following command:

nslookup -querytype=mx gcgapremium.com

You then see the restuls:
Server: UnKnown
Address: 10.0.0.1
Non-authoritative answer:
gcgapremium.com MX preference = 90, mail exchanger = mx1.emailsrvr.com
gcgapremium.com MX preference = 20, mail exchanger = mx2.emailsrvr.com

What does this tell you?

10.0.0.1 is the IP Address of the primary mail Server.
gcgapremium.com is unknown to DNS
The mx1.emailsrvr.com is a backup mail server.
The MX Servers are showing too much information to the public.

A

The mx1.emailsrvr.com is a backup mail server.

Explanation:
This indicates that the mx1.emailsrvr.com is a backup mail server. The preference of mx1.emailsrvr.com is 90, which is higher than the preference of 20 for mx2.emailsrvr.com. In other words, mx2.emailsrvr.com is the primary email server and mx1.emailsrvr.com is the secondary email server. The “Address: 10.0.0.1” response indicates that the address of the Domain Name System (DNS) server that gave the response is 10.0.0.1. The “Server: UnKnown” response indicates that the DNS server is not using PTR records, which resolve IP addresses to hostnames. Note that “UnKnown” looks like a typo but is the way that nslookup (short for name server lookup) displays it. The MX records are required so that other Internet-based mail servers can find the mail servers handling mail sent to a domain.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 370-371). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Administrators are configuring a Server within your organization’s screened subnet. This Server will have the following capabilities when it is fully configured:

  • It will use RRSIG
  • It will perform Authenticated requests for A records.
  • It will perform Authenticated requests for AAAA records.

What BEST identifies the capabilities of this Server?

SSH
SNMPv3
S/MIME
DNSSEC

A

DNSSEC (Domain Name System Security)

Explanation:
This is a Domain Name System (DNS) server with the added capabilities of DNS Security Extensions (DNSSEC). DNSSEC is a suite of extensions to DNS. It uses a Resource Record Signature (RRSIG), commonly referred to as a digital signature, to provide data integrity and authentication for DNS replies. A DNS server resolves hostnames to IP addresses. Secure Shell (SSH) is commonly used to connect to remote systems and can be used to send files in an encrypted format over a network. Simple Network Management Protocol version 3 (SNMPv3) is used to manage and monitor network devices. Secure/Multipurpose Internet Mail Extensions(S/MIME) is a popular standard used to encrypt email, but email is not mentioned in the scenario.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 371). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maggie regularly connects to a remote Server named gcga using Secure Shell (SSH) from her Linux System. However, she has trouble remembering the password, and she wants to avoid using it without sacrificing Security. She creates a Cryptographic Key Pair to use instead. Which of the following commands is the BEST choice to use after creating the Key Pair?

ssh-copy-id -1 ~.ssh/id_rsa.pub maggie@gcga
chmod 644 ~/.ssh/id/rsa
ssh-keygen -t rsa
ssh root@gcga

A

ssh-copy-id -1 ~.ssh/id_rsa.pub maggie@gcga

Explanation:
After creating the key pair, she should use the ssh-copy-id command to copy the public key to the server.

The first step uses the ssh-keygen -t rsa command. This creates an RSA-based key pair (a private key and a public key). The public key’s location and the name is ~.ssh/id_rsa.pub, and the private key’s location and the name is ~/.ssh/id_rsa.

The second step is to copy the public key to the remote server using the command ssh-copy-id -i ~.ssh/id_rsa.pub maggie@gcga.

The private key should always stay private, but the chmod 644 command makes it readable by everyone, so it shouldn’t be used.

The ssh command connects to the remote server using Secure Shell (ssh). However, it’s not required to connect to the server before copying it. The ssh-copy-id command is a utility within the OpenSSH suite of tools.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 371-372). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are tasked with enabling NTP on some Servers within your organization’s screened subnet. Which of the following use cases are you MOST likely supporting with this action?

Encrypting Voice and Video Transmissions
Providing Time Synchronization
Enabling Email Usage
Encrypting Data-in-Transit

A

Providing Time Synchronization

Explanation:
The Network Time Protocol (NTP) provides time synchronization services, so enabling NTP on servers in the screened subnet (sometimes called a demilitarized zone or DMZ) would meet this use case.

The Secure Real-time Transport Transport Protocol (SRTP) provides encryption, message authentication, and integrity for audio and video over IP networks.
Protocols such as Simple Mail Transfer Protocol (SMTP), Post Office Protocol v3 (POP3), and Internet Message Access Protocol version 4 (IMAP4) are used for email.
Encrypting data isn’t relevant to time synchronization services provided by NTP.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 372). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your organization has several Switches in use throughout the internal Network. Management wants to implement a Security Control to prevent unauthorized access to these Switches within the Network. Which of the following choices would BEST meet this need?

Disable unused Ports
Disable STP
Enable SSH
Enable DHCP

A

Disable unused Ports

Explanation:
You can prevent unauthorized access by disabling unused physical ports on the switches as an overall port security practice. This prevents the connection if someone plugs their computer into an unused disabled port.

Spanning Tree Protocol (STP) prevents switching loop problems and should be enabled.
Secure Shell (SSH) encrypts traffic and can be used to connect to network devices for management, but it doesn’t directly protect a switch.
Dynamic Host Configuration Protocol (DHCP) is used to dynamically issue IP addresses and is unrelated to this scenario.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 372). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Admins manage Network devices remotely. However, a recent Security audit discovered they are using a protocol that allows them to send credentials over the Network in cleartext. Which of the following methods should be adopted to eliminate this vulnerability?

Use SNMPv2c
Use SSH
Use SSL
Use SFTP

A

Use SSH (Secure Shell)

Explanation:
Secure Shell (SSH) can be used to connect to many network devices and is the best answer of the given choices. It encrypts the entire session, including the credentials.

The scenario indicates that administrators are likely using Simple Network Management Protocol v1 (SNMPv1), SNMPv2, or SNMPv2c. These protocols all send a community string over the network in cleartext. SNMPv3 (which isn’t available as a possible answer) encrypts the credentials before sending them over the network.
Secure Sockets Layer (SSL) has been deprecated and shouldn’t be used.
Secure File Transfer Protocol (SFTP) is a secure implementation of FTP and is used to transfer files, not manage network devices.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 372-373). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following devices would MOST likely have the following entries used to define its operation?

  • permit IP any any eq 80
  • permit IP any any eq 443
  • deny IP any any

Firewall
Proxy Server
Web Server
Jump Server

A

Firewall

Explanation:
These are rules in an access control list (ACL) within a firewall. The first two rules indicate that traffic from any IP address, to any IP address, using ports 80 or 443 is permitted or allowed. The final rule is also known as an implicit deny rule and is placed last in the ACL. It ensures that all traffic that hasn’t been previously allowed is denied.

A proxy server would not use an ACL, although it would use ports 80 and 443 for Hypertext Transfer Protocol (HTTP) and HTTP Secure (HTTPS), respectively.
A web server wouldn’t use an ACL, although it would also use ports 80 and 443.
A jump server is a server placed between different security zones (such as an internal network and a screened subnet) and is used to manage devices in the other security zone.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 373). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your organization’s Network has the following setup:

Subnet 1:
HQ - 10.0.1.0/24
Firewall 1

Subnet 2:
HQ - 10.0.2.0/24
Firewall 2

Subnet 3:
Hot Site - 10.0.3.0/24
Firewall 3

All Firewalls should enforce the following Requirements:
- Use only Secure Protocols for Remote Management
- Block Cleartext Web Traffic

The following shows the Current Rules configured in Firewall 1:
HTTPS Outbound – Any – 10.0.1.0/24 – HTTPS – Allow
HTTP Outbound —- Any – 10.0.1.0/24 – HTTP —- Allow
DNS ——————–Any – 10.0.1.0/24 – DNS ——Allow
HTTPS Inbound —10.0.1.0/24 — Any — HTTPS —Allow
HTTP Inbound —- 10.0.1.0/24 — Any — HTTP —– Block
Telnet —————- 10.0.3.0/24 — Any – Telnet —– Allow
SSH —————— 10.0.1.0/24 — Any – SSH ——- Allow

You’re asked to verify the rules are configured correctly. Which rule - if any, should be changed to ensure Firewall 1 meets the stated requirements?

HTTPS Outbound
HTTP Outbound
DNS
Telnet
SSH
None. All rules are Correct

A

HTTP Outbound

Explanation:
The Hypertext Transfer Protocol (HTTP) rule should be changed from Allow to Block to block cleartext web traffic.

The Telnet rule has the incorrect Destination address and the incorrect action. It should be 10.0.1.0/24 and set to Block because it is not a secure protocol for remote management. However, because it has the incorrect address (10.0.3.0/24), it won’t have any effect on traffic to Firewall 1.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 373). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Springfield Nuclear Power Plant has several stand-alone computers used for monitoring. Employees log on to these computers using a local account to verify proper operation of various processes. The CIO of the organization has mandated that these computers cannot be connected to the organization’s Network or have access to the Internet. Which of the following would BEST meet this requirement?

Air gap the computers.
Place the computers in a screened subnet.
Create a separate isolated Network for these computers.
Place the computers within a VLAN.

A

Air gap the computers.

Explanation:
The best choice of the available answers is to air gap the computers. An air gap provides physical isolation, indicating that there is a gap of air between an isolated system and other systems.

A screened subnet (sometimes called a demilitarized zone or DMZ) provides a buffer between the Internet and an internal network and would connect these computers to both the internal network and the Internet.
The scenario doesn’t indicate the computers need to be connected, so a separate isolated network is not needed.
Placing the computers within a virtual local area network (VLAN) would connect the computers to a network.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 373-374). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have added another Router in your Network. This Router provides a path to a limited access Network that isn’t advertised. However, a Network administrator needs to access this Network regularly. Which of the following could he do to configure his computer to access this limited Network?

Implement QoS Technologies
Add a VLAN
Use the Route Command
Open additional Ports to the Router

A

Use the Route Command

Explanation:
The route command can be used to display and manipulate the routing table on a Linux computer. Using this, you can provide another gateway path through this router to the limited access network. None of the other choices can add routing paths.

Quality of Service (QoS) technologies allow administrators to give priority of some network traffic over other network traffic.
A virtual local area network (VLAN) is used to segment or isolate a network, so configuring one won’t grant access to a network.
A router doesn’t have ports that can be opened for individual users.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 374). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Several Servers in your organization’s screened subnet were recently attacked. After analyzing the logs, you discover that many of these attacks used TCP, but the packets were not part of an established TCP session. Which of the following devices would provide the BEST solution to prevent these attacks in the future?

Stateless Firewall
Stateful Firewall
Network Firewall
Web Application Firewall

A

Stateful Firewall

Explanation:
A stateful firewall filters traffic based on the state of the packet within a session. It would filter a packet that isn’t part of an established Transmission Control Protocol (TCP) session, which starts with a TCP three-way handshake.

A stateless firewall filters traffic based on the IP address, port, or protocol ID.
While it’s appropriate to place a network firewall in a screened subnet (sometimes called a demilitarized zone or DMZ), a network firewall could be either a stateless firewall or a stateful firewall.
A web application firewall (WAF) is specifically designed to protect a web application, commonly hosted on a web server, but the attack was on several servers, not just a web server.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (p. 374). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your Network currently has a dedicated Firewall protecting access to a web server. It is currently configured with only the following two rules in the ACL:

PERMIT TCP ANY ANY 443
PERMIT TCP ANY ANY 80

You have detected DNS requests and DNS zone transfer requests coming through the Firewall and you need to block them. Which of the following would meet this goal? (Choose TWO. Each answer is a full solution.)

Add the following rule to the Firewall: DENY TCP ALL ALL 53.
Add the following rule to the Firewall: DENY UDP ALL ALL 53.
Add the following rule to the Firewall: DENY TCP ALL ALL 25.
Add the following rule to the Firewall: DENY IP ALL ALL 53.
Add an implicit deny rule at the end of the ACL.

A

Add the following rule to the Firewall: DENY IP ALL ALL 53.
Add an implicit deny rule at the end of the ACL.

Explanation:
The easiest way is to add an implicit deny rule at the end of the access control list (ACL) and all firewalls should have this to block all unwanted traffic. You can also deny all IP traffic using port 53 with DENY IP ALL ALL 53.

Domain Name System (DNS) requests use UDP port 53, and DNS zone transfers use TCP port 53, so blocking only TCP 53 or UDP 53 does not block all DNS traffic.
Port 25 is for Simple Mail Transfer Protocol (SMTP) and unrelated to this question.

Gibson, Darril. CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide (pp. 374-375). YCDA, LLC. Kindle Edition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Developers recently configured a new service on ServerA. ServerA is in a DMZ and accessed by internal users and via the Internet. Network Admins modified Firewall rules to access the service. Testing shows the service works when accessed from internal systems. However, it does not work when accessed from the Internet. Which of the following is MOST likely configured incorrectly?

The New Service
An ACL
ServerA
The VLAN

A

An ACL

17
Q

Your organization recently purchased a sophisticated Security appliance that includes a DDoS mitigator. Where should you place this device?

Within the DMZ
At the border of the Network, between the intranet and the DMZ.
At the border of the Network, between the Private Network and the Internet.
In the Internal Network.

A

At the border of the Network, between the Private Network and the Internet.

18
Q

You need to configure a UTM Security appliance to restrict traffic going to social media sites. Which of the following are you MOST likely to configure?

Content Inspection
Malware Inspection
URL Filter
DDoS Mitigator

A

URL Filter

19
Q

An organization has recently had several attacks against Servers within a DMZ. Security Admins discovered that many of these attacks are using TCP, but they did not start with a Three-Way Handshake. WHich of the following devices provides the BEST solution?

Stateless Firewall
Stateful Firewall
Network Firewall
Application-based Firewall

A

Stateful Firewall