Module 22 - Network Hardening - Q&A Flashcards
Which of the following describes a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user? A. Proxy B. Firewall C. NIDS D. NIPS
A. A proxy is a network device that intercepts user or host requests and then makes those requests to other hosts or networks on behalf of the user.
Which of the following is an advanced form of proxy and can also perform content filtering and web application attack prevention functions? A. NIPS B. Firewall C. Web security gateway D. NIDS
C. A web security gateway is an advanced form of proxy and can also perform content filtering and web application attack prevention functions.
Which of the following types of connections does a VPN concentrator control? (Choose two.) A. Device VPN B. Client VPN C. User VPN D. Site-to-site VPN
B, D. A VPN concentrator manages connections for both client and site-to-site VPN connections.
A NIPS is considered a \_\_\_\_\_\_\_\_\_\_ type of control. A. detective B. preventative C. network D. host
B. A network intrusion prevention system (NIPS) is considered a preventative type of control.
Which of the following types of systems detects network attacks based upon how they compare with a baseline of traffic patterns that are considered normal for the network? A. Pattern-based B. Rule-based C. Signature-based D. Behavior-based
D. Behavior-based detection systems detect network attacks based upon how they compare with a baseline of traffic patterns that are considered normal for the network.
Which of the following is used to intercept and examine network traffic based upon protocol? A. Sniffer B. NIDS C. NIPS D. Proxy
A. A sniffer, or protocol analyzer, is used to intercept and examine network traffic based upon protocol.
Which of the following does MAC filtering use as its filtering criteria? A. Hardware address B. Software address C. Logical address D. IP address
A. MAC filtering uses a host’s network hardware address as its filtering criteria.
You are configuring a network device. You want to be able to manage the device remotely using only the Secure Shell (SSH) protocol. If enabled by default, you should disable all of the following ports, protocols, and services, except: A. Telnet B. UDP port 69 C. TCP port 22 D. RDP
C. You should not disable TCP port 22, as this is the port that SSH uses. All other port and protocol choices should be disabled, as they are not needed, nonsecure, or both.
Which of the following techniques can be used to detect rogue or unauthorized hosts? (Choose all that apply.) A. DHCP address assignment logs B. NAC C. Switch port and VLAN connection logs D. IP address
A, B, C. All of these techniques can be used to detect rogue or unauthorized hosts. A rogue client can’t be detected, however, simply by examining its IP address alone.
Which of the following terms refers to combination of multifunction security devices? A. NIDS/ NIPS B. Application firewall C. Web security gateway D. Unified Threat Management
D. Unified Threat Management refers to combination of multifunction security devices.