Lesson 9 - Questions Flashcards
A recent security evaluation concluded that your company’s network design is too consolidated. Hosts with wildly different functions and purposes are grouped together on the same logical area of the network. In the past, this has enabled attackers to easily compromise large swaths of network hosts. What technique(s) do you suggest will improve the security of the network’s design, and why?
You are discussing a redesign of network architecture with a client, and they want to know what the difference between an extranet and Internet is. How can you explain it?
Why is subnetting useful in secure network design?
How can an enterprise DMZ be implemented?
What type of network requires the design to account for east-west traffic?
Why might an ARP poisoning tool be of use to a threat actor performing network reconnaissance?
How could you prevent a malicious attacker from engineering a switching loop from a host connected to a standard switch port?
What port security feature mitigates ARP poisoning?
What is a dissolvable agent?
True or false? Band selection has a critical impact on all aspects of the security of a wireless network?
The network manager is recommending the use of “thin” access points to implement the wireless network. What additional appliance or software is required and what security advantages should this have?
What is a pre-shared key?
Is WPS a suitable authentication method for enterprise networks?
You want to deploy a wireless network where only clients with domain-issued digital certificates can join the network. What type of authentication mechanism is suitable?
Why are many network DoS attacks distributed?
What is an amplification attack?