Module 9 Flashcards
What is a virtual firewall?
- A firewall that runs in an endpoint virtual machine
- A firewall that blocks only incoming traffic
- A firewall appliance that runs on a LAN
- A firewall that runs in the cloud
-A firewall that runs in the cloud
Correct. A virtual firewall is one that runs in the cloud. Virtual firewalls are designed for settings, such as public cloud environments, in which deploying an appliance firewall would be difficult or even impossible.
Which of the following is NOT correct about L2TP?
- It does not offer encryption.
- It is used as a VPN protocol.
- It is paired with IPSec.
- It must be used on HTML5 compliant devices.
-It must be used on HTML5 compliant devices.
Correct. L2TP does not have to be used in conjunction with HTML5.
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
- Stateful packet filtering
- Proxy firewall
- Connection-aware firewall
- Packet filtering firewall
-Stateful packet filtering
Stateful packet filtering uses both the firewall rules and the state of the connection: that is, whether the internal device requested each packet. A stateful packet filtering firewall keeps a record of the state of a connection between an internal endpoint and an external device.
Which type of monitoring methodology looks for statistical deviations from a baseline?
- Heuristic monitoring
- Behavioral monitoring
- Anomaly monitoring
- Signature-based monitoring
Anomaly monitoring is designed for detecting statistical anomalies.
Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?
- IP denier
- MAC pit
- DDoS Prevention System (DPS)
- DNS sinkhole
-DNS sinkhole
A DNS sinkhole changes a normal DNS request to a pre-configured IP address that points to a firewall that has a rule of Deny set for all packets so that every packet is dropped with no return information provided to the sender. DNS sinkholes are commonly used to counteract DDoS attacks. Many enterprises contract with a DDoS mitigation service that helps identify DDoS traffic so that it is sent to a sinkhole while allowing legitimate traffic to reach its destination.
Which of the following best describes east-west traffic?
- Movement of data from an unsecured endpoint to a server outside a data center
- Movement of data from a router to an enterprise switch
- Movement of data from one unsecured endpoint to another
- Movement of data from one server to another within a data center
-Movement of data from one server to another within a data center
East-west traffic refers to the movement of data from one server to another within a data center.
Which technology allows scattered users to be logically grouped even when they are connected to different physical switches?
- WAN
- VLAN
- LAN
- VPN
-VLAN
Virtual local area networks (VLAN) can logically group devices connected to different switches.
Which of the following best describes a host-based firewall?
- A host-based firewall is a hardware firewall that protects a single endpoint device.
- A host-based firewall is a hardware firewall that protects multiple endpoint devices.
- A host-based firewall is a software firewall that protects multiple endpoint devices.
- A host-based firewall is a software firewall that protects a single endpoint device.
-A host-based firewall is a software firewall that protects a single endpoint device.
A host-based firewall is a software-based firewall and can protect only the installed device.
Sansa is a network security administrator at an enterprise. She is asked to take appropriate steps to defend against a MAC address spoofing attack in the enterprise network. Which of the following methods should Sansa apply?
- Configure the switch so that only one port can be assigned per MAC address
- Increase the capacity of CAM to allow for an increased volume of MAC addresses
- Close all unused ports in the switch so that old MAC addresses are not allowed
- Configure the switch so that no changes can be done once a port is assigned to a MAC address
Configure the switch so that only one port can be assigned per MAC address
In an interview, Max was asked to tell one difference between a software firewall and a virtual firewall. How should Max answer?
- Virtual firewalls are cost-free, whereas software firewalls are paid services.
- Software firewalls can protect all the endpoints in a network, whereas virtual firewalls can protect only one device.
- Virtual firewalls are used on almost all devices, whereas software firewalls are mostly used by enterprises.
- Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud.
Software firewalls are locally installed on a device, whereas virtual firewalls are hosted on the cloud.
In an interview, you are asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose?
- Switches can transfer packets when VLAN members on one switch need to communicate with members connected to another switch.
- Workgroup switches reside at the top of the hierarchy and carry traffic between switches.
- Load balancers can detect and stop protocol attacks directed at a server or application.
- Zero trust is designed to make a system trusted.
-Load balancers can detect and stop protocol attacks directed at a server or
As a cybersecurity expert, you are asked to take adequate measures to mitigate DDoS attacks on your enterprise servers. Which of the following techniques should you apply?
- You should set up a DNS sinkhole.
- You should set up a virtual private network.
- You should set up a proxy server.
- You should set up a host-based firewall.
-You should set up a DNS sinkhole.
When a Distributed denial of service (DDoS) attack is sensed in a network, the traffic is redirected to a DNS sinkhole that will never give the command-and-control server any response, as the packets will be dropped when they reach the DNS sinkhole.
An employee at your enterprise is caught violating company policies by transferring confidential data to his private email. As a security admin, you are asked to prevent this from happening in the future. Which of the following actions should you perform?
- You should set up a DLP.
- You should set up an ACL.
- You should set up a NAC.
- You should set up a VPN.
-You should set up a DLP.
Data loss prevention (DLP) continuously monitors confidential data, and if any suspicious activity is detected, it immediately generates an alert.
Which of the following is a network set up with intentional vulnerabilities?
- Virtual private network
- Honeypot
- Honeynet
- Sinkhole
-Honeynet
Correct. A honeynet refers to a network of honeypot’s made with intentional vulnerabilities to attract attackers.
Which of the following outlines the process of a proxy server?
- User - forward proxy - user - reverse proxy - Internet
- User - internet - reverse proxy - forward proxy - user
- User - forward proxy - Internet - reverse proxy - user
- User - reverse proxy - Internet - forward proxy - user
-User - forward proxy - Internet - reverse proxy - user
The traffic from the user is first intercepted by the forward proxy. The forward proxy then connects to the internet, and the data is sent to the reverse proxy. The reverse proxy then sends the data to the user.