final - 30 cards a day Flashcards
Identify which of the following designations can be associated with a member who coordinates the resources necessary to solve a problem and also ensures that the security policy is followed and that everyone within the organization is aware of the situation?
Manager
Suppose you notice a sudden decrease in network performance and suspect malware is hogging network resources. Which of the following commands will you use to display the PID (process identifier) associated with your network connection?
netstat -o
Which type of a recovery plan accounts for the worst-case scenarios and provides contingency plans for restoring or replacing computer systems, power, telephone systems, and paper-based files?
A Disaster Recovery Plan
is a part of the BCP (business continuity plan) that details the processes for restoring critical functionality and data to a network after an outage.
You are a network administrator at Yosaka & Associates, a private law firm. The employees have been facing various types of data errors and other transmission problems, leading to decreased productivity. You need to find an appropriate technique that will help identify locations of network bottlenecks. Which of the following techniques would you choose in such a scenario?
Traffic Analysis
the examination of network traffic for patterns and exceptions to those patterns.
Donald is a schoolteacher living in Atlanta. While conducting online classes, he experienced a momentary decrease in voltage. His computer shut down and when he switched it back on, he realized that he had lost some data. He called his friend Chadwick who is a network analyst to check out what the issue was. Chadwick found that there was a power flaw caused by an overtaxed electrical system. Such voltage decreases can cause computers or applications to fail and potentially corrupt data. What kind of power flaw caused this issue in Donald’s house?
Brownout
temporary dimming of lights
One of the employees in your organization is suspected of hacking into the network. You as a network administrator want to check the user’s activity for the last week. Which of the following will you use in such a scenario?
Audit Log
is a collection of data in logs that is consistent and thorough enough to retroactively prove compliance and also to defensibly prove user actions.
Which bandwidth management technique adjusts the way network devices respond to indications of network performance issues caused by traffic congestion throughout a network?
Congestion Control
manages the entrance of traffic onto the network, other methods allow for more nuanced control after what happens to the traffic once it’s on the network. (Qos)
A network connection is congested as a result of which there are multiple network fluctuations and latency issues. You as a network administrator plan on solving this issue by using a network device to send signals to the sender or receiver of the data packets that the network is congested. Which of the following will you use in this scenario?
Explicit Signaling
the closed-loop response to existing congestion. (Backward/Forward)
Which of the following is used to create flow records that show relationships among various traffic types?
NetFlow
is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where NetFlow is enabled.
Which KPI (key performance indicator) indicates delayed network communications while devices wait for responses or resend transmissions?
Packet Drops
packets that are damaged beyond use, arrive after their expiration, or are not allowed through an interface are dropped.
Jilead Inc. is a software development company that is preparing an incident response plan to prepare for possible events such as a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee’s computer, malware outbreak, or a full-scale environmental disaster that shuts down businesses throughout the city or state. The response plan has identified the members of the response team and the responsibilities have been assigned and clearly spelled out to each team member. Stanley Hudson has been entrusted with the responsibility of being the person on call who first notices or is alerted to the problem. He has to create a record for the incident, detailing the time it began, its symptoms, and any other pertinent information about the situation. He must remain available at all times to answer calls from clients or employees. What is the role that Stanley has been assigned?
Dispatcher
Which of the following steps of an incident response plan involves the process of repairing affected systems and putting them back in operation to ensure the smooth running of operations?
Recovery
Francine, a new network administrator at an online thrift store, is required to use an application that monitors traffic on the interface between a single device and the network. The application must be able to see the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the one computer. Which of the following methods should Francine use to monitor the network traffic?
Protocol Analyzer
You are working with an ISP, and you have to impose a maximum cap limit to each client so that your company can predict and purchase accordingly from the network provider. Which of the following terms will you associate with this process?
Traffic Policing
is a traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
You are a network analyst who has been tasked with managing the volume of network traffic across an organization in order to prevent network congestion. On analyzing the current network, you notice that one of the primary reasons for congestion is that the switches used in the network keep resending data packets that have been lost in the transmission far too quickly. Which of the following do you think should be implemented to solve this issue?
Retransmission Policy
A fraudulent financial deal has just taken place in the company where you are working as a network administrator. The data of the company will be collected in such a way that it can be presented in a court of law for the purpose of prosecution. Some of the forensic data available for analysis may be damaged or destroyed if improperly handled. You have been assigned the duty to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence. To prevent contamination of evidence, you have made sure that each device involved is isolated-that is, the device is disconnected from the network and secured to ensure that no one else has contact with it until the response team arrives. What is the next step that you will take in the event of such an illegal activity?
Document The Scene.
creating a defensible audit trail is one of the highest priorities in the forensics process. An audit trail is a system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events. A defensible audit trail is an audit trail that can be justified and defended in a court of law according to specific standards
Which network monitoring method can be used to ensure that all traffic sent to any port on a switch is also sent to a device connected to the mirrored port?
Port Mirroring
Goldwin Enterprises has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. To monitor the entire network, you will require a device that will display sensor data on your configurable dashboard. Which of the following software will you request from the management?
Room Alert Monitor by AVTECH
You have been assigned the role of a network administrator, and your first task requires you to measure the throughput between network hosts. Which of the following tools will you use in this scenario?
iPerf
is a command-line based tool.
Which of the following backs up only the data that has changed since the last backup?
Incremental Backups
Which of the following is not a technique used in a closed-loop response to an existing congestion?
Admission Policy
closed-loop responses include:
-Implicit Signaling
-Explicit Signaling
-Choke Packet
-Backpressure
Which of the following steps of an incident response plan includes the act of limiting the damage by the team, where affected systems or areas are isolated, and response staff are called in as required by the situation?
Containment
You are the network administrator in Jolene Consultancy Pvt. Ltd., a small consultancy in Missouri. You have been assigned the task of monitoring network traffic in the systems. You must ensure that many devices can be configured to report their traffic and other statistics to a network monitor. Which of the following would you use in this scenario?
Reporting
A system of documentation that makes it possible for a third party to inspect evidence later and understand the flow of events is called _____.
An Audit Trail
BNB Group of Institutions has been facing a lot of issues with its network ever since it decided to adopt online classes as a medium to impart education. The IT department analyzes the issue and is of the opinion that the problems are related to the high amount of traffic due to students trying to log in from various locations; as a result, the network devices are overloaded. The IT department has requested your help as a network administrator. Which of the following bandwidth management techniques will you suggest in this scenario?
Flow Control
is a bandwidth management technique configured on interfaces to balance permitted traffic volume with a device’s capability of handling that traffic.
Trevor is working as a network engineer at Spring Oaks High School. The school’s management has been facing some issues while handling network traffic. Trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. Which of the following technologies should Trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?
QoS
The 3-2-1-1 Rule defines backup principles to follow to reliably recover lost data under a wide variety of adverse conditions. What does the “2” in the second part of the principle denote?
Save Backups on at least Two Different Media Types.
3-2-1-1 is a collection of backup principles that requires at least three complete copies of the data, backups saved on at least two media types, with at least one copy stored offsite, and at least one copy stored offline.
You have recently been appointed as a network analyst at Hayle Communications. Your first assignment requires you to limit the traffic between a single receiver and a single sender. Which of the following bandwidth management techniques will you use in this scenario?
Flow Control
is a bandwidth management technique configured on interfaces to balance permitted traffic volume with a device’s capability of handling that traffic.
You are working as a network engineer at IBV Solutions. The network administrator tells you to prepare a report of all the bad NICs that have been retransmitted, leading to a bad network. Which of the following will you use to state this in your report?
Jabbers
network performance baselines are obtained by analyzing network traffic information and might include information on the utilization rate for your network backbone, number of users logged on per day or per hour, number of protocols that run on your network, statistics about errors (such as runts, jabbers, or giants), frequency with which networked applications are used, or information regarding which users take up the most bandwidth.
You have been hired as a systems analyst by an online food delivering service. Your job requires you to keep the network congestion free during peak hours and to ensure that important traffic can survive the congestion while less sensitive frames are discarded. Which of the following techniques will you use in such a scenario?
Discarding Policy
is an Open-Loop technique
Which of the following power flaws is also called a sag?
Brownout
Which of the following monitors network traffic and might receive data from monitored devices that are configured to report their statistics?
Network Monitor
Agar is a network analyst at BMV, a mobile network. He efficiently manages the network’s QoS (Quality of Service) configurations for adjusting the priority a network assigns to various types of transmissions. He ensures timely delivery of the most important traffic while optimizing performance for all users. The management at BMV wants to conduct a pilot test for a new product, and they have requested Agar to limit the momentary throughput rate for an interface. Analyze which of the following Agar should use in this scenario.
Traffic Policing
is a traffic-shaping technique in which the volume or rate of traffic traversing an interface is limited to a predefined maximum.
Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?
Retransmission Policy
is an Open-Looped technique.
Retransmission timers help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often.
James, a network engineer, has been contracted by a company to monitor network performance. In order to know and analyze any problem in a network, James will need to understand how the network functions in a normal state. Analyze which of the following will be of use to James in this scenario.
Checking the Network’s Performance Baseline
baseline is a record of how a network or resource operates under normal conditions.
What is an Ethernet packet that is smaller than 64 bytes called?
Runt
An organization determined that there was an increase in network latency, and it approached you, a network administrator, to solve the issue. You decide that the extra demand on the network device’s CPU and memory should be lessened to solve this issue. You also plan on getting a comprehensive view of the network traffic and sample traffic as well. Which of the following will you use in this scenario?
SNMP (Simple Network Message Protocol)
Trap is a type of unsolicited SNMP message sent from an agent to the NMS (network management system) once specified conditions on the managed device are met.
You are hired as a network administrator to monitor an organization’s network status on an ongoing basis and to make changes to best meet the needs of your network’s users. One feedback that you have received from the network engineer of the firm is that one of the modems is repeatedly power cycling to reset network activity. Which of the following KPIs will help you in getting a better understanding of the situation?
Interface Statistics
Which power device prevents momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?
Surge Protector
is a power management device that redirects excess voltage away from connected computing or networking devices to the ground, thereby protecting connected devices from harm.
HomeLand is an organization that rescues abandoned dogs. They set up a hotline for the general public to report any street dog that they spot anywhere in the city or any dog that they feel needs to be rescued. Within 12 hours of the hotline being activated, the network starts experiencing congestion, messages are corrupted or dropped, and connected devices start resending frames to make up for the loss. These kinds of problems are overwhelming the network as a whole. This generates even more traffic, making the congestion even worse. Analyze which of the following policies HomeLand should adopt to detect congestion on the network after experiencing several missed acknowledgment messages.
Implicit Signaling
is a Closed-Loop respose.
As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario?
access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5
Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?
SoD (Separation of Duties)
You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?
DAI (Dynamic ARP Inspection)
is a configuration on a switch that compares incoming messages with the switch’s DHCP snooping binding table to determine whether the message’s source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. DAI helps protect against ARP spoofing attacks.
Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?
IPS (Intrusion Prevention System)
is a stand-alone device, an application, or a built-in feature running on a workstation, server, switch, router, or firewall that stands in-line between an attacker and the targeted network or host and can prevent traffic from reaching that network or host.
*Pic: Placement of IPS devices and software on a network.
Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised.
Use proxy servers to mask Internet activities
Proxy Server is a server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
*Pic: A proxy server is used to connect to the nternet.
You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario?
ACL (Access Control List)
is a list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.
MNT Enterprises has hired you as a network administrator to help the organization design a more comprehensive traffic analysis and protection tool to protect the entire network from hackers trying to flood the network with traffic. Which of the following will you use in this situation?
NIPS (network-based intrusion prevention system)
is a type of intrusion prevention that protects an entire network and is situated at the edge of the network or in a network’s screened subnet.
An IDS (intrusion detection system) has been installed in your organization as a stand-alone device to monitor network traffic and to generate alerts about suspicious activities. You as a network analyst have been assigned to check the effectiveness of the device. You notice that the effectiveness of the IDS has significantly come down since its installation because it has not been updated. Which of the following processes will you use in updating the IDS?
Signature Management
is the process of regularly updating the signatures used to monitor a network’s traffic.
Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure?
Auditing
Which authorization method grants access to a user when the user’s classification and category match those of a resource?
MAC (mandatory access control)
is a method of access control where resources are organized into hierarchical classifications, such as “confidential” or “top secret,” and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user’s classification and category match those of a resource, then the user is given access.
The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees’ access to these websites. Which of the following firewalls will you use in this scenario?
Application Layer Firewall
is a firewall that can block designated types of traffic based on application data contained within packets.
As a network administrator, you are already aware of the possible option of using a default trust relationship between a network device and another by a hacker to access an entire network. Which of the following security measures will you use to prevent a possible DoS attack that can be induced by sending high volumes of router advertisement messages?
RA Guard
A feature that can be configured on switches to filter RA messages according to interface, MAC or IP address, router priority, or other factors.
Which of the following is a device or an application that stores or generates information known only to its authorized user?
Security Token
is a device or piece of software used for authentication that stores or generates information, such as a series of numbers or letters, known only to its authorized user.
Which of the following will you use to monitor and analyze data stored in logs?
SIEM (Security Information and Event Management)
is software that can be configured to evaluate data logs from IDS, IPS, firewalls, and proxy servers to detect significant events that require the attention of IT staff according to predefined rules.
In which of the following do the bits work opposite of how bits in a subnet work?
Wildcard Mask
statements can also specify network segments (groups of IP addresses) by using a network address for the segment and a wildcard mask. The bits in a wildcard mask work opposite of how bits in a subnet mask work. The 0s in the wildcard mask say to match the IP address bits to the network address given, and the 1s say you don’t care what the value of those bits are. For example, a wildcard mask of 0.0.0.255
Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario.
A Host-Based Firewall
is a firewall that only protects the computer on which it’s installed.
Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.
class-map limit-icmp
Which of the following technologies selectively filters or blocks traffic between networks?
Firewall
You as a network administrator want a switch to determine if the message’s source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. Which of the following switch security configurations will you use alongside DAI on a network switch in this scenario?
DHCP Snooping
is a security feature on switches whereby DHCP messages on the network are checked and filtered.
Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network?
ACL (Access Control List)
is a list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.
You as a network administrator plan on using an NIDS (network-based intrusion detection system) to protect your network. You plan on doing this by monitoring the traffic that will be carried by a switch. Which of the following will you use in such a scenario?
SPAN (Switched Port Analyser)
a.k.a Port Mirroring
which is a monitoring technique in which one port on a switch is configured to send a copy of all the switch’s traffic to the device connected to the port. It captures some of traffic crossing a switch, but TAP can capture all traffic between two devices.
A special kind of DoS (denial of service) attack has attacked an AAA server with authentication requests that must all be processed and responded to. The network administrator has analyzed the situation and requested you, a network engineer, to use a command by which you can reclaim compromised resources in case of a similar attack in the future. Which of the following commands will you use in this scenario?
floodguard
by default, a floodguard feature might be configured on the AAA server to reclaim compromised resources. Floodguard settings can be changed with the floodguard command.
Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?
Stateless Firewall
Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario.
police 8000 conform-action transmit exceed-action drop
Fred works as the network administrator at Globecomm Communications. The HR team at Globecomm has come up with a new working policy for the employees. This policy allows the employees to freely work at any time of the day as long as they submit the work within 24 hours. Keeping this policy in view, Fred has to work on strengthening the security of the network by adding additional authentication restrictions. Analyze which of the following Fred should do in this scenario.
Restrict some user accounts to a specific number of hours of logged-on time
As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context.
Set a limit on consecutive login attempts
Identify and analyze whether the implicit deny rule be applied to the following statements or not.
When the incoming packet is denied in the third test by the ACL
You are employed as a network administrator of Vincent Motors. An unreleased blueprint of a new car model of Vincent Motors has term-38been leaked on the Internet. You assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. Which of the following access control techniques will you use so that such an activity can be detected in the future?
Accounting
in the context of network security, the process of logging users’ access and activities on a network.
Which authorization method allows a network administrator to receive from a user’s supervisor a detailed description of the roles or jobs the user performs for the organization?
RBAC (Role-Based Access Control)
Which of the following can capture all traffic traversing a network connection?
TAP (Test Access Point)
You as a network engineer have finished setting up local security policies for your Windows 10 operating system. Which of the following commands will you use to implement your changes in this scenario?
gpudate
You are the network engineer for Muhan Mobile Services. The network administrator has asked you to separate the authentication, auditing, and authorization process. Which of the following tools will you use in such a scenario?
TACACS+ (Terminal Access Control System Access Control System Plus)
is a Cisco proprietary protocol that provides AAA services.
Michelle has been inducted into an organization as a trainee. Which of the following firewall software should she use to protect only the computer on which it is installed?
Host-Based Firewall
You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization’s resources. Which of the elements of the AAAA acronym will you use to apply this security measure?
Authentication
Identify which of the following terms defines the process of verifying a user’s credentials.
Authentication
The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future?
FIM (File Integrity Monitoring)
is a security technique that alerts the system of any changes made to files that shouldn’t change, such as operating system files.
Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won’t receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?
Proxy Server
is a server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
Which of the following commands is used to assign a statement to an ACL on Cisco routers?
Access-List
Which of the following issues keys to clients during initial authentication?
KDC (Key Distribution Center)
Which of the following is used to issue tickets to an authenticated client for access to services on the network?
TGS
In which of the following phases of the social engineering attack cycle will an attacker require the most time investment?
Research
*Pic: this cycle might happen quickly over a few seconds, or take much longer, even years.
Which of the following methods requires the entry of a code to open a door?
Cipher Lock
or Keypad.
*Pic: a cipher lock can document who enters an area and when.
In which of the following forms of attack can an attacker redirect and capture secure transmissions as they occur?
On-Path Attack
previously called a MitM (man-in-the-middle) attack.
EX: Evil Twin attack (type of On-Path attack).
You, as a network engineer, want to have an insight into your network’s weaknesses that need attention. You want to search for devices with open ports indicating which insecure service might be used to craft an attack and identify unencrypted sensitive data. Which of the following scanning tools will you use in this scenario?
Nessus
developed byL Tenable Security.
Nessus performs even more sophisticated vulnerability scans than Nmap. Among other things, Nessus can identify unencrypted, sensitive data (such as credit card numbers) saved on your network’s hosts. The program can run on your network or from off-site servers continuously maintained and updated by the developer.
Which of the following is not a social engineering strategy?
DoS (Denial-of-Service)
is an attack in which a legitimate user is unable to access normal network resources because of an attacker’s intervention. Most often, this type of attack is achieved by flooding a system with so many requests for services that it can’t respond to any of them.
At a security training exercise, you had to devise a strategy to penetrate into an organization’s data room by accessing one of their employee’s ID cards. You decided to demonstrate this exercise by offering a free gift to one of the employees in exchange for a few hours of data room access. Which kind of social engineering method have you used in such a scenario?
Quid Pro Quo
Gary is a freelance network analyst. A client approaches him to provide a solution for his firm wherein employees have been found to carry sensitive information out of the office premises. This data breach has led to a lot of market speculations as a result of which there has been a significant drop in the share market prices of the company’s stocks. Gary is contracted to find a solution to this issue. Analyze which of the following options should be carried out by Gary keeping in mind the sensitivity of the situation.
Deploy a DLP solution.
DLP is a security technique that uses software to monitor confidential data, track data access and ownership, and prevent it from being copied or transmitted off the network.
As a network administrator, you have asked one of the contracted vendors of the company to ship a consignment of spare parts and components of all the network devices. You have decided to place this order to store the devices for a rainy day. Now, as the consignment has been received by your organization, you want to store these devices in a secure location. Which of the following will you use in this scenario?
Locking Cabinets
is a storage container secured by a locked panel or door that might be used to store documents or hardware not in use.
Zeneth Computers is a software development company. It has received a random email claiming that there will be an attempt to hack and extract sensitive financial data of the company before the year end. The company has contacted you, a network analyst, to verify if such claims are indeed true. You have decided to set up a trap for the hackers by putting up a system containing false financial data. Which of the following will you use in this scenario?
Honeypot
is a decoy system isolated from legitimate systems and designed to be vulnerable to security exploits for the purposes of learning more about hacking techniques or nabbing a hacker in the act.
You have been appointed as a network administrator at JJ Securities. The CEO of the company has requested your presence to address some security concerns. The CEO feels that certain members of the senior management who have access to privileged accounts might be under serious social engineering attacks by potential hackers. So, the CEO wants you to monitor the activities of these privileged accounts. Which of the following software will you use in this situation?
PAM (Privileged Account Management) tool
Rob has enrolled himself as a network security trainee in JV Internet Securities. Which of the following terms should he know to understand the advantage taken of a software vulnerability that hasn’t yet or only very recently become public?
Zero-Day Exploit
Which of the following terms identifies the weakness of a system that could lead to compromised information or unauthorized access?
Vulnerability
Chelsea is a hacker who befriends Adele McCain over lunch at the cafeteria. Adele is the senior associate of Spandangle Ltd., a private law firm based in Alabama. Chelsea manages to successfully guess Adele’s password to a sensitive database in the law firm. What kind of password attack did she use?
Brute-Force Attack
is an attempt to discover an encryption key or password by trying numerous possible character combinations until the correct combination is found.
Kickstart Securities provides network analysis and safety measurement services to various clients. Recently, one of its clients has requested a technician to run a cross-check on the network system to ensure that there are no vulnerabilities that are exposed. You have been sent in to assess the situation and fix the errors if there are any. Which of the following will you use in such a scenario to track the vulnerabilities across systems?
CVE (Common Vulnerabilities and Exposures)
is a dictionary project funded by the U.S. Department of Homeland Security and managed by The MITRE Corporation to index cybersecurity vulnerabilities.
Andy Bryant is a network analyst at Freewoods Centre for Policy Research. There are approximately 35 employees currently working on various issues of policy making and research, and this requires access to the network’s resources. He has been asked to set a list of dos and don’ts for all the employees to clarify what is acceptable use of company IT resources and what is not. He also needs to explain penalties for violations and describe how these measures protect the network’s security. Analyze which of the following security policies Andy should implement in this scenario.
AUP (Acceptable Use Policy)
is the portion of a security policy that explains to users what they can and cannot do while accessing a network’s resources and the penalties for violations. It might also describe how these measures protect the network’s security.
Which of the following devices scans an individual’s unique physical characters such as iris color patterns to verify the person’s identity?
Biometrics