Module 12 - Network Security Infrastructure Flashcards
What is the purpose of a personal firewall on a computer?
To increase the speed of the Internet connection
To protect the computer from viruses and malware
To filter the traffic that is moving in and out of the PC
To protect the hardware against fire hazard
To filter the traffic that is moving in and out of the PC
What is the main difference between the implementation of IDS and IPS devices?
An IDS can negatively impact the packet flow, whereas an IPS can not.
An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall.
An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology.
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately
Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
Device Type
Cable Specification
Interface Identifier
Cable Type and Identifier
OS/IOS Version
Connection Type
Interface identifier
Connection Type
What is a characteristic of a WAN?
It is typically owned and managed by a single home or business.
It requires a wireless access point to connect users to the network.
It spans across a campus or city to enable sharing of regional resources.
It connects multiple networks that are geographically separated.
It spans across a campus or city to enable sharing of regional resources.
It is called a WAN (wide-area network) because it spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.
For example, businesses with many international branch offices use a WAN to connect office networks together.
What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device?
NetFlow
Network tap
Port Mirroring
SNMP
Port Mirroring
When enabled on a switch, port mirroring copies frames sent and received by the switch and forwards them to another port, which has a analysis device attached.
What is a function of a proxy firewall?
Drops or forwards traffic based on packet header information
Connects to remote servers on behalf of clients
Filters IP traffic between bridged interfaces
Uses signatures to detect patterns in network traffic
Connects to remote servers on behalf of clients
Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?
Threat Intelligence
Network Admission Control
Website Filtering and Block Listing
Network Profiling
Threat Intelligence
How is a source IP address used in a standard ACL?
It is the criterion that is used to filter traffic.
It is the address that is unknown, so the ACL must be placed on the interface closest to the source address.
It is the address to be used by a router to determine the best path to forward packets.
It is used to determine the default gateway of the router that has the ACL applied.
It is the criterion that is used to filter traffic.
The only filter that can be applied with a standard ACL is the source IP address. An extended ACL is used to filter on such traffic as the source IP address, destination IP address, type of traffic, and type of message.
Refer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?
Untrusted Network
Perimeter Security Boundary
Internal Network
DMZ
A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.
Which statement describes the Cisco Cloud Web Security?
It is a security appliance that provides an all-in-one solution for securing and controlling web traffic.
It is an advanced firewall solution to guard web servers against security threats.
It is a cloud-based security service to scan traffic for malware and policy enforcement.
It is a secure web server specifically designed for cloud computing.
It is a cloud-based security service to scan traffic for malware and policy enforcement.
Which network service allows administrators to monitor and manage network devices?
SNMP
Syslog
NTP
NetFlow
SNMP
What is a feature of the TACACS+ protocol?
It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
It utilizes UDP to provide more efficient packet transfer.
It combines authentication and authorization as one process.
It encrypts the entire body of the packet for more secure communications.
It encrypts the entire body of the packet for more secure communications.
Which layer of the hierarchical design model is a control boundary between the other layers?
Core
Access
Distribution
Network
Distribution
The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters.
The distribution layer also acts as a control boundary between the access and core layers.
Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
MD5
ESP
AES
IPsec
IPsec
Which statement describes a difference between RADIUS and TACACS+?
RADIUS separates authentication and authorization whereas TACACS+ combines them as one process.
RADIUS encrypts only the password whereas TACACS+ encrypts all communication.
RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not.
RADIUS uses TCP whereas TACACS+ uses UDP.
RADIUS encrypts only the password whereas TACACS+ encrypts all communication.*