Implementation Flashcards
Which IPSec mode is used to create a VPN between two gateways
Tunnel mode
Who can change a resource’s category in a mandatory access control environment?
Administrators only
What is the purpose of content inspection
To search for malicious code or behavior
Which information do routers use to forward packets to their destinations?
The network address and subnet mask
Where should you physically store mobile devices to prevent theft?
- Locked cabinet
* Safe
What is Lightweight Extensible Authentication Protocol (LEAP)
A proprietary wireless LAN authentication method developed by Cisco Systems
Between which two OSI layers does Secure Sockets Layer (SSL) operate?
- Between the OSI Transport and Application layers
* Layer 4 to Layer 7
What is the purpose of Remote Access Dial-In User Service (RADIUS)?
Enables remote access users to log onto a network through a shared authentication database
What is a TMP?
A dedicated processor that uses cryptographic keys to perform a variety of tasks
What would a certification authority (CA) do if a private key associated with a certificate had been compromised?
Revoke the certificate
Which settings ensure that accounts are not used beyond a certain date and/or time?
Account expiration
What is the purpose of network access control (NAC)?
Ensures that the computer on the network meets an organization’s security policies
What are the two modes of WPA and WPA2?
- Personal, aka
- Preshared Key
- WPA-PSK / WPA2-PSK
- Enterprise
What is the name of the area that connects to a firewall and offers services to untrusted networks?
Demilitarized zone (DMZ)
Which security-server application and protocol implement authentication of users from a central server over UDP?
Remote Authentication Dial-In User Service (RADIUS)
What is the purpose of an aggregation switch?
Combine multiple streams of bandwitdh into one
Which type of IDS detects malicious packets on a network?
Network intrusion detection system (NIDS)
What is a sandbox in a secure staging deployment?
A test environment that is completely isolated from the rest of the network
What does the acronym MAC denote?
Mandatory Access Control
What application or service uses TCP/UDP port 3389?
Remote Desktop Protocol (RDP)
Which audit category will audit all instances of users exercising their rights?
Audit Privilege Use audit category
Which setting ensures that repeated attempts to guess a user’s password is not possible beyond the configured value?
Account lockout
What is the purpose of BitLocker To Go?
Ensure that USB flash drives issued by the organization are protected by encryption
What does the subject field in an X.509 v3 certificate contain?
The name of the certificate owner
What does the acronym RADIUS denote?
Remote Authentication Dial-In User Service
Which implementation of the File Transfer Protocol (FTP) provides the least security?
Trivial File Transfer Protocol (TFTP)
What port number does HTTP use?
Port 80
Which two security protocols does IP Security (IPSec) use?
- Authentication Header (AH)
* Encapsulating Security Payload (ESP)
What is the purpose of load balancing?
Distribute the workload across multiple devices
On which standard is Lightweight Directory Access Protocol (LDAP) based?
X.500
What are the non-overlapping channels for 802.11g/n
Channels 1, 6, and 11
Which protocol provides real-time, online revocation information about certificates?
Online Certificate Status Protocol (OCSP)
What is the purpose of anti-spam applications or filters?
Prevent unsolicited email
What is the purpose of a spam filter?
Identify and block unwanted messages
What are the non-overlapping channels for 802.11b?
Channels 1, 6, 11, and 14
Certificate enrollment procedures typically require a user to provide proof of identify and which other item to a certification authority (CA)?
Public key
What is the primary security advantage of using network address translation (NAT)?
Hides internal IP addresses from the public network
What does VLAN segregation accomplish?
It protects each individual segment by isolating the segments
Which firewall port should you enable to allow POP3 traffic to flow through the firewall?
TCP port 110
What is a VPN concentrator?
A device that creates a virtual private network (VPN)
Which type of key management does Secure Multipurpose Internet Mail Extensions (S/MIME) use: centralized or decentralized?
Centralized
What is the purpose of content inspection?
Search for malicious code or behavior
Which security protocol is best used for connection-oriented systems such as an intranet?
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Does the S/MIME protocol use certificates?
Yes
What is the purpose of MAC filtering?
To restrict the clients that can access a wireless network
Which category of IDS might increase logging activities, disable a service, or close a port as a response to a detected security breach?
Active detection
Which firewall port should you enable to allow SMTP traffic through the firewall?
Port 25
On which standard are certificates based?
X.509
What is the purpose of secure shell(SSH)?
Secure remote access
What is Protected Extensible Authentication Protocol (PEAP)?
A protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel
What is meant by the term hardware root of trust?
Highly reliable hardware, firmware, and software components that perform specific, critical security functions
Which authentication protocol separates authentication and authorization: TACACS+ or RADIUS?
TACACS+
Why is password disclosure a significant security issue in a single sign-on (SSO)network
It could compromise the entire system because authentication grants access to ANY systems on the network to which the actual user may have permission
Which type of IDS or IPS uses an initial database of known attack types but dynamically alerts their signatures based on learned behavior?
Heuristic
Which port number is used by SSH, SCP, and SFTP?
Port 22
Which authentication protocol uses tickets to authenticate users?
Kerberos
Which two chips are used to implement hardware-based encryption?
- Trusted Platform Module (TPM)
* Hardware Security Module (HSM)
Which function does a single sign-on (SSO) system provide?
It allows a user to present authentication credentials once and gain access to all computers within the SSO system?
What is the top-most level of the LDAP hierarchy?
Root
What does the acronym TPM denote?
Trusted Platform Module
What does the acronym SMTP denote?
Simple Mail Transfer Protocol
Which three security features do digital certificates provide?
- Authentication
- Data integrity
- Non-repudiation
Which security device requires physical possession and has passwords that can only be used once?
Token
What is the difference between trusted platform module (TMP) chips and hardware security module (HSM) chips
- TPM chips are a part of the motherboard
* HSM chips are part of a PCI cart that is mounted to the motherboard
Which type of IDS detects attacks on individual devices?
Host Intrusion Detection System (HIDS)
What port number does NNTP use?
TCP port 119
Which type of access control is the multi-level security mechanism used by the Department of Defense (DoD)?
Mandatory access control (MAC)
Which port number does LDAP use for communications encrypted using SSL/TLS?
Port 636
Which firewall port should you enable to allow IMAP4 traffic to flow through the firewall?
TCP port 143
What are the two major types of intrusion detection systems (IDS)?
- Network IDS (NIDS)
* Host IDS (HIDS)
What defines the allowed uses for a certificate issued by a certification authority (CA)?
Certificate policy
What does the acronym KDC denote?
Key distribution center
Which port numbers are used by NetBIOS?
Ports 137-139
What is the most common type of system used to detect intrusions into a computer network?
Network Intrusion Detection System (NIDS)
Which account should you disable immediately after installing a new operating system (OS) to harden the OS?
Guest account
What does the acronym IDS denote?
Intrusion Detection System
What port number does DNS use?
Port 53
Does each VLAN create its own collision domain or its own broadcast domain?
Broadcast domain
What is the purpose of S/MIME?
Secure encryption and digital signatures for email
What is the purpose of SNMP?
Routing and switching management
Which password attack does account lockout policy protect against?
Brute force attack
What does the acronym NFC denote?
Near field communication