Formative 1 Flashcards

To review

1
Q

Which device in a layered defense-in-depth approach denies connections initiated from untrusted networks to
internal networks, but allows internal users within an organization to connect to untrusted networks?

IPS
Firewall
Internal Router
Access Layer Switch

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An adminstrator discovers that a user is accessing a newly established website that may be detrimental to
company security. What action should the adminstrator take first in terms of the security policy?

Ask the user to stop imediately and inform the user that this constitutes grounds for dismissal

Revise the AUP immediately and get all users to sign the updated AUP.

Create a firewall rule blocking the respective website.

Immediately suspend the network privileges of the user

A

Revise the AUP immediately and get all users to sign the updated AUP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which tool can be used to gather information about the different types of traffic that exist in a network?

protocol analyzer

rtp

application server

QoS

A

Protocol Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With the evolution or borderless networks, which vegetable is now used to describe a defense-in-depth approach?

lettuce
cabbage
artichoke
onion

A

Artichoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which section of a security policy is used to specify that only authorized individuals should have access to
enterprise data?

identification and authentication policy

acceptable use policy

statement of scope

statment of authority

A

Identification and Authentication Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of a defense-in-depth approach?

All network vulnerabilirties are mitigated.

Only a single layer of security at the network core is required

The need for firewalls is eliminated

The effectiveness of other security measurers is not impacted when a security mechanism fails.

A

The effectiveness of other security means is not impacted when a security mechanism fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three)

vulnerabilities in the system

total number of devices that attach to thte wired and wireless network

past security breaches

assets that need protection

location of attacker or attackers

threats to assets

A

Vulnerabilities in the system.

Assets that need protection.

Threats to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What three goals a BYOD security policy accomplish? (Choose three)

Identify and prevent all heuristic virus signatures

identify which employees can bring their own devices

identify safeguards to put in place if a device is compromised

describe the rights to access and activities permitted to security

personnel on the device

A

Identify which employees can bring their own devices.

Identify safeguards to puut in place if a device is compromised.

Describe the rights to access and activities permitted to security personnal on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which device is usually the first line of defense in a layered defense-in-depth approach?

A

Edge Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What component of a security policy explicity defines the type of traffic allowed on a network and what users are allowed and not allowed to do?

acceptable use policies

remote access policies

password policies

identification and authentication policies

A

Acceptable Use Policies (AUP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly