Exam Compass - SOHO Security Settings Quiz Flashcards

1
Q

Because wireless routers are shipped with default credentials, the process of securing a SOHO network should include changing the default username and password on a Wireless Access Point (WAP).
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of network traffic filtering criteria can be set on a router?
Filtering by IP address
Filtering by network protocol
Filtering by subnet
Filtering by logical port number
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the answers listed below refers to an application software that selectively blocks access to websites?
Captive portal
Firewall
Content filter
Proxy server

A

Content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to an example of content filtering configuration setting on a SOHO router?
Modem mode
Parental controls
MAC filtering
IP and port filtering

A

Parental controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An optimal Wireless Access Point (WAP) antenna placement provides a countermeasure against:
War chalking
Spoofing
War driving
Insider threat

A

War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the WAP settings listed below allows for adjusting the boundary range of a wireless signal?
WPS setup
Radio channel
Power level controls
Beacon interval

A

Power level controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DHCP server’s IP exclusion configuration option allows network administrators to remove a single IP address or a range of IP addresses from the pool of addresses being assigned automatically to the requesting DHCP client computers. IP exclusion prevents other DHCP clients from requesting an IP address statically assigned to other essential network hosts (e.g., servers, or wireless printers).
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of architecture that simplifies networking by allowing devices to dynamically join a network, autoconfigure, and learn about the presence and capabilities of other devices is known as:
PoE
DHCP
SDN
UPnP

A

UPnP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refers to the concept of zero-configuration networking?
DHCP
PnP
UPnP
AutoRun

A

UPnP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of technologies that should not be used due to their known vulnerabilities or other security risks include: (Select 2 answers)
RDP
UPnP
WEP
TLS
SNMP

A

UPnP
WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A lightly protected subnet (a.k.a. DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:
Captive portal
Honeynet
Quarantine network
Extranet
Screened subnet

A

Screened subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Service Set Identifier (SSID) is a unique identifier (a.k.a. wireless network name) for a WLAN. Wireless networks advertise their presence by regularly broadcasting SSID in a special packet called beacon frame. In wireless networks with disabled security features, knowing the network SSID is enough to get access to the network. SSID also pinpoints the wireless router that acts as a Wireless Access Point (WAP). Wireless routers from the same manufacturer are frequently configured with default (well-known) SSID names. Since multiple devices with the same SSID displayed on the list of available networks create confusion and encourage accidental access by unauthorized users (applies to networks that lack security), changing the default SSID is a recommended practice.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disabling SSID broadcast:
Is one of the measures used in the process of securing wireless networks
Makes a WLAN harder to discover
Blocks access to a WAP
Prevents wireless clients from accessing the network

A

Makes a WLAN harder to discover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For a wireless client to be able to connect to a network, the security type (e.g., WEP, WPA, WPA2, or WPA3) and encryption type (e.g., TKIP or AES) settings on the connecting host must match the corresponding wireless security settings on a Wireless Access Point (WAP).
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of wireless network that provides access to the Internet, but not to the internal network is referred to as guest WiFi network. Setting up a separate network for visitors (handled by a dedicated access point) protects the internal network against risks related to unauthorized activities and malware infections.
True
False

A

True

17
Q

In the context of implementing secure network designs, the term “Port security” may apply to:
Disabling physical ports on a device (e.g., RJ-45 device ports on a router, switch, or patch panel)
Implementing MAC filtering
Disabling unused logical ports (TCP/UDP)
Implementing Port-based Network Access Control (defined in the IEEE 802.1X standard)
All of the above

A

All of the above

18
Q

Port mirroring allows an administrator to inspect traffic passing through a network switch. On a switch that supports port mirroring, a packet analyzer can be connected to an empty port and the switch can be configured to pass a copy of the data sent over one or multiple ports on that switch to the packet sniffer port allowing the administrator to monitor contents of the traffic passing through the switch.
True
False

A

True