Module 22 - Network Hardening - Q&A Flashcards

1
Q
Which of the following describes a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user?
A. Proxy
B. Firewall
C. NIDS
D. NIPS
A

A. A proxy is a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following is an advanced form of proxy and can also perform content filtering and web application attack prevention functions?
A. NIPS
B. Firewall
C. Web security gateway
D. NIDS
A

C. A web security gateway is an advanced form of proxy and can also perform content filtering and web application attack prevention functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following types of connections does a VPN concentrator control? (Choose two.)
A. Device VPN
B. Client VPN
C. User VPN
D. Site-to-site VPN
A

B, D. A VPN concentrator manages connections for both client and site-to-site VPN connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A NIPS is considered a \_\_\_\_\_\_\_\_\_\_ type of control.
A. detective
B. preventative
C. network
D. host
A

B. A network intrusion prevention system (NIPS) is considered a preventative type of control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following types of systems detects network attacks based upon how they compare with a baseline of traffic patterns that are considered normal for the network?
A. Pattern-based
B. Rule-based
C. Signature-based
D. Behavior-based
A

D. Behavior-based detection systems detect network attacks based upon how they compare with a baseline of traffic patterns that are considered normal for the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is used to intercept and examine network traffic based upon protocol?
A. Sniffer
B. NIDS
C. NIPS
D. Proxy
A

A. A sniffer, or protocol analyzer, is used to intercept and examine network traffic based upon protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following does MAC filtering use as its filtering criteria?
A. Hardware address
B. Software address
C. Logical address
D. IP address
A

A. MAC filtering uses a host’s network hardware address as its filtering criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
You are configuring a network device. You want to be able to manage the device remotely using only the Secure Shell (SSH) protocol. If enabled by default, you should disable all of the following ports, protocols, and services, except:
A. Telnet
B. UDP port 69
C. TCP port 22
D. RDP
A

C. You should not disable TCP port 22, as this is the port that SSH uses. All other port and protocol choices should be disabled, as they are not needed, nonsecure, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following techniques can be used to detect rogue or unauthorized hosts? (Choose all that apply.)
A. DHCP address assignment logs
B. NAC
C. Switch port and VLAN connection logs
D. IP address
A

A, B, C. All of these techniques can be used to detect rogue or unauthorized hosts. A rogue client can’t be detected, however, simply by examining its IP address alone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following terms refers to combination of multifunction security devices?
A. NIDS/ NIPS
B. Application firewall
C. Web security gateway
D. Unified Threat Management
A

D. Unified Threat Management refers to combination of multifunction security devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly