Exam Compass Net+ Network Hardening Flashcards

1
Q

Of the three existing versions of the Simple Network Management Protocol (SNMP), which versions offer authentication based on community strings sent in an unencrypted form (in cleartext)?
Which verstions provide packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e. validation of data integrity)?

A

cleartext: v1 and v2
encryption: v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In IPv6, a router periodically sends a special type of message to announce its presence on the network. A mechanism that allows to filter these messages (i.e. reject those that are labeled as unwanted or rogue) is known as what?

A

RA Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the context of implementing secure network designs, the term “Port security” may apply to which of the following (select all that apply)?

Disabling physical ports on a device (e.g. RJ-45 device ports on a switch)
MAC address filtering
Disabling unused logical ports (TCP/UDP)
Implementing Port-based Network Access Control (defined in the IEEE 802.1X standard)

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a dedicated security mechanism that prevents ARP attacks?

A

DAI (Dynamic ARP Inspection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a Cisco-proprietary security feature designed to protect routers and switches against reconnaissance and Denial-of-Service (DoS) attacks.

A

Control Plane Policing (CoPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Private VLANs are created via which of the following:

Port mirroring
Port forwarding
Port isolation
Port aggregation

A

Port isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F: The process of securing networking devices should include the practice of disabling unused physical ports.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following actions allow(s) to improve the security of a SOHO router (select all that apply)?

Changing default admin credentials
Implementing MAC address filtering
Blocking unwanted traffic via firewall settings
Disabling unused physical ports
Implementing content filtering
Performing firmware updates
Implementing physical security controls (e.g. a door lock)

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following actions would be of help in the process of web server hardening?

Removing server version banner
Disabling unnecessary ports, services, and accounts
Keeping the system up to date via updates and patches
Enabling and monitoring logs
Permissions audits

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following factors are considered important for creating strong passwords? (Select 2 answers)

Password length
Minimum password age
Password history
Password complexity
Maximum password age
A

length and complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following passwords is the most complex?

YzGdL3tU8wx
T$7C52WL4S9@W0
G$L3tU8wY@z
@TxBL$nW@Xt*a#
A

G$L3tU8wY@z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A security feature of a network switch that provides countermeasures against rogue DHCP servers is called:

DHCP scope
DHCP reservation
DHCP snooping
DHCP relay agent
A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an effective countermeasure against VLAN Hopping?

A

Changing the native VLAN on all trunk ports to an unused VLAN ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a rule-based access control mechanism implemented on routers, switches, and firewalls?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the policy that applies to any requests that fall outside the criteria defined in an ACL?

A

implicit deny policy

17
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:

War chalking
Tailgating
War driving 
Shoulder surfing
A

War driving

18
Q

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage?

Protocol analyzer
WAP power level controls
Logical network diagram
Network mapper
A

WAP power level controls

19
Q

Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?

PSK
802.1X
SAE
TKIP
A

PSK