Exam 5 Flashcards
A computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
A. Bridge
B. Active hub
C. Server
D. Proxy
A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network.
Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?
A. PAC
B. DDNS
C. PAM
D. NAT
Network Address Translation (NAT) is a routing technology that can help improve network security by hiding internal IP addresses from external networks. NAT can also help with traffic filtering, tracking, and managing network traffic
Which of the answers listed below refers to a solution that simplifies web browser configurations by using predefined rules or scripts to make server selection decisions for specific web traffic?
A.PAC
B. DDNS
C. PAM
D. NAT
A PAC file, or proxy auto-configuration file, is like a tiny map that guides your web browser to websites. Instead of going straight to a website, a PAC file can forward your traffic through a proxy server first, protecting your device and filtering unwanted URL access.
Which of the following provides passive network security breach response on an individual computer system?
A. HIDS
B. NIPS
C. HIPS
D. NIDS
A Host-Based Intrusion Detection System, or HIDS, is a type of cybersecurity solution that monitors IT systems for signs of suspicious activity to detect unusual behaviors or patterns associated either with human users or applications that could be a sign of a security breach or attempted attack.
A host-based IDS is an intrusion detection system that monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior. An HIDS gives you deep visibility into what’s happening on your critical security systems.
Which of the answers listed below refer to the characteristic features of a NIDS? (Select 3 answers)
A Takes proactive measures to block or mitigate intrusion attempts
B. Does not take direct action to block or prevent attacks
C. Generates alerts and notifies security personnel or administrators when suspicious activity is detected
D. Monitors network traffic without direct involvement in traffic routing or packet modification
E. Can drop or reject network packets, terminate connections, or take other actions to stop the attack
F. Operates in an inline mode, actively intercepting and inspecting network traffic
NDIS may refer to the National Defense Industrial Strategy, which is a strategy to modernize the defense industrial base in the United States. The strategy aims to build a more resilient defense industrial ecosystem through collaboration between the government, private industry, and international partners. The strategy also aims to provide the military with the capabilities to defeat any nation that threatens the security of the United States.
Which of the following answers refer to a NIPS? (Select 3 answers)
A. Takes proactive measures to block or mitigate intrusion attempts
B. Generates alerts and notifies security personnel or administrators when suspicious activity is detected
C. Operates in an inline mode, actively intercepting and inspecting network traffic
D. Monitors network traffic without direct involvement in traffic routing or packet modification Does not take direct action to block or prevent attacks
E. Can drop or reject network packets, terminate connections, or take other actions to stop the attack
A NIPS (Network-based Intrusion Prevention Services) is used in conjunction with a firewall to provide defense-in-depth protection as well as nip monitoring; it is not generally utilized in place of a firewall. A false NIPS alert is also more detrimental than a false positive by a NIDS because real traffic is blocked, potentially causing production issues.
Which of the answers listed below refers to network security technology designed to monitor WLANs for unauthorized access, security threats, and suspicious activities?
A. UTM
B. WIDS
C. NGFW
D. WAF
WIDS stands for Wireless Intrusion Detection System. It is a technology designed to protect wireless networks from unauthorized access. It does this by monitoring traffic on the network to identify any suspicious activity that may indicate a security breach. WIPS stands for wireless intrusion prevention system.
Which of the following answers refers to network security technology designed to monitor, detect, and mitigate unauthorized access, security threats, and suspicious activities in WLANs?
A. WIPS
B. NIDS
C. WIDS
D. NIPS
WIPS stands for Wireless Intrusion Prevention System. WIPS uses a combination of techniques to detect and prevent intrusions in real time. It not only monitors but also takes action to prevent rogue access points, man in the middle attacks, denial-of-service attacks, and other threats to the wireless network.
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:
A. Content filter
B. Proxy server
C. Load balancer
D Domain controller
In active-active mode, load balancers distribute network traffic across:
A. Least utilized servers
B. None of the servers
C. All servers
D. Most utilized servers
In Active/Active mode, two or more servers aggregate the network traffic load, and working as a team, they distribute it to the network servers. The load balancers can also remember information requests from users and keep this information in cache.
In active-passive mode, load balancers distribute network traffic across:
A. All servers
B. Servers marked as active
C. Least utilized servers
D. Servers marked as passive
In an active-passive setup, one server/resource is active and handles all incoming traffic, while the passive server remains on standby. If the active server fails, the passive server takes over, making sure there’s no service interruption
Which of the answers listed below refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?
A. IEEE 802.1X
B. IEEE 802.11ac
C. IEEE 802.1D
D. IEEE 802.11x
802.1X is an IEEE standard framework for encrypting and authenticating a user who is trying to associate to a wired or wireless network. WPA-Enterprise uses TKIP with RC4 encryption, while WPA2-Enterprise adds AES encryption.
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, LEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.
True
False
Which of the following EAP methods offers the highest level of security?
A, PEAP
B. EAP-FAST
C. EAP-TLS
D. EAP-TTLS
Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) is a certificate-based authentication method that uses public-key cryptography to improve network security. It’s considered one of the most secure authentication techniques available.
A dedicated security solution that filters, monitors, and blocks HTTP/HTTPS traffic between a web application and the Internet is called:
A. UTM
B. NGFW
C. UEM
D. WAF
A Web Application Firewall (WAF) is a security solution that protects web applications, mobile applications, and APIs from malicious attacks and unwanted internet traffic. WAFs are designed to analyze HTTP/S requests at the application layer, acting as an intermediary between the user and the app. They monitor, filter, and block data packets to and from web applications, detecting and blocking malicious requests before they reach users or web applications.
The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False
Unified threat management (UTM) is a network security approach that combines multiple security features into a single device or service, such as a hardware device, virtual device, or cloud service. UTM devices are often positioned at key points within a system to monitor, manage, and mitigate threats.
Which of the answers listed below refers to a firewall type that improves upon first- and second-generation firewalls by offering additional features, such as more in-depth inspection of network traffic and application-level inspection?
A. IDS
B. Packet filter
C. NGFW
D. Stateful firewall
A Next-Generation Firewall (NGFW) is a firewall designed to protect against the modern cyber threats that companies face. In addition to the core functions of a firewall, NGFWs integrate a range of other capabilities to protect against advanced cyber threats.
Which of the following answers refer to the characteristic features of a Layer 4 firewall? (Select 3 answers)
A. Operates at the application layer of the OSI model
B. Offers complex (slower) traffic filtering
C. Filters traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP)
D. Offers basic (faster) traffic filtering
E. Operates at the transport layer of the OSI model
F. Adds the ability to inspect the contents of data packets in addition to the header information
Which of the answers listed below refer to a Layer 7 firewall? (Select 3 answers)
A.Offers complex (slower) traffic filtering
B. Filters traffic based on source/destination IP addresses, ports, and protocol types (e.g., TCP/UDP)
C. Operates at the transport layer of the OSI model
D. Adds the ability to inspect the contents of data packets in addition to the header information
E. Offers basic (faster) traffic filtering
F. Operates at the application layer of the OSI model
Examples of protocols typically used for implementing secure VPN tunnels include: (Select all that apply)
A. IPsec
B. SRTP
C. TLS
D. bcrypt
E. L2TP
Which VPN type is used for connecting computers to a network? (Select 2 answers)
A. Remote access
B. Intranet-based
C. Client-to-site
D. Site-to-site
E. Extranet-based