Final Exam Flashcards
97%
Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet?
Question 1 options:
IPsec
PPTP
SSL
L2TP
IPsec
Which IPsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
Question 2 options:
IKE
IPsec driver
Oakley protocol
ISAKMP
IPsec driver
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?
Question 3 options:
DMZ intermediary
caching firewall
proxy server
caching-only DNS server
proxy server
Which of the following is a benefit of using centralized data collection to manage sensor data?
Question 4 options:
data stays on the local network
less administrative time
less network traffic
must use a VPN to transport data
less administrative time
What is a suggested maximum size of a rule base?
Question 5 options:
10 rules
100 rules
300 rules
30 rules
30 rules
Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.
Question 6 options:
True
False
False
The process of testing a network defense system is referred to as which of the following?
Question 7 options:
security auditing
IDPS evaluation
distributed data collection
change management
security auditing
What should a company concerned about protecting its data warehouses and employee privacy consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
Question 8 options:
router
proxy server
VPN server
ICMP monitor
proxy server
Which of the following is a disadvantage of using a proxy server?
Question 9 options:
may require client configuration
can’t filter based on packet content
slows Web page access
shields internal host IP addresses
may require client configuration
Standards and protocols used in VPNs are in their infancy and seldom used.
Question 10 options:
True
False
False
Computers on the Internet are identified primarily by their IP address.
Question 11 options:
True
False
True
Which of the following is NOT a type of event that you would normally monitor?
Question 12 options:
user account creation
antivirus scanning
access to shared folders
e-mail attachment handling
access to shared folders
A dual-homed host has a single NIC with two MAC addresses.
Question 13 options:
True
False
False
Which of the following is true about the Internet?
Question 14 options:
it was originally built on an extended star topology
it is the same as the World Wide Web
it was established in the mid-1960s
it was developed by a network of banks and businesses
it was established in the mid-1960s
At what layer of the OSI model do proxy servers generally operate?
Question 15 options:
Application
Session ?
Network
Transport
Transport
Since ICMP messages use authentication, man-in-the-middle attacks cannot be successful.
Question 16 options:
True
False
The first phase of the system development life cycle is needs assessment.
Question 17 options:
True
False
True
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?
Question 18 options:
proxy server
Layer 7 switch
ICMP redirector
translating gateway
proxy server
Which of the following is a network’s ability to detect attacks when they occur and to evaluate the extent of damage and compromise?
Question 19 options:
recovery
recognition
resistance
reliability
recognition
The first step in SNA is the survivability analysis.
Question 20 options:
True
False
False
SQL injection attacks are isolated to custom applications, so administrators can prevent them.
Question 21 options:
True
False
False
Which of the following is described as the combination of an IP address and a port number?
Question 22 options:
portal
datagram
socket
subnet
socket
What is considered the ‘cleanup rule’ on a Cisco router?
Question 23 options:
implicit allow
implicit deny all
explicit prompt
explicit allow all
implicit deny all
Which VPN protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in MS-CHAP?
Question 24 options:
SSL
IPsec
PPTP
L2TP
PPTP
What type of attack displays false information masquerading as legitimate data?
Question 25 options:
Java applet
SQL injection
buffer overflow
phishing
phishing
Which is best defined as the ability of a system to continue operations despite a failure?
Question 26 options:
adaptation and evolution
reliability audit
survivability analysis
fault tolerance
fault tolerance
Which of the following is considered an asset?
Question 27 options:
intellectual property
unpatched Web server
disgruntled employee
hacker
intellectual property
What should an outside auditing firm be asked to sign before conducting a security audit?
Question 28 options:
search and seizure contract
subpoena
nondisclosure agreement
social engineering covenant
nondisclosure agreement
Network protection is something you should implement initially and then only make changes if there is a serious security breach.
Question 29 options:
True
False
False
Firewalls can protect against employees copying confidential data from within the network.
Question 30 options:
True
False
False
Which of the following is NOT a phase in the system development life cycle?
Question 31 options:
system implementation
performance monitoring
security audit
needs assessment
security audit
Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
Question 32 options:
NSF
NAP
POP
ISP
NAP
Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate?
Question 33 options:
security association
tunnel
internet key exchange
pairing
security association
A screened host has a router as part of the configuration.
Question 34 options:
True
False
True
Security auditing is the process of documenting countermeasures put in place due to attacks on the network.
Question 35 options:
True
False
True
Where should network management systems generally be placed?
Question 36 options:
out of band
in the server farm
in the DMZ
on the perimeter
out of band
In centralized data collection, data from sensors go to security managers at each corporate office.
Question 37 options:
True
False
Question 38 (1 point)
False
Which element of a rule base conceals internal names and IP addresses from users outside the network?
Question 38 options:
QoS
NAT
filtering
trackin
NAT
What feature of the 13 DNS root servers enables any group of servers to act as a root server?
Question 39 options:
unicast addressing
multicast addressing
broadcast addressing
anycast addressing
anycast addressing
Which of the following defines how employees should use the organization’s computing resources?
Question 40 options:
Network and Internet Policy
Acceptable Use Policy
Computing and Resource Policy
Email and Spam Policy
Acceptable Use Policy