Module 9 Flashcards
What is a virtual firewall?
- A firewall that runs in an endpoint virtual machine
- A firewall that blocks only incoming traffic
- A firewall appliance that runs on a LAN
- A firewall that runs in the cloud
-A firewall that runs in the cloud
Correct. A virtual firewall is one that runs in the cloud. Virtual firewalls are designed for settings, such as public cloud environments, in which deploying an appliance firewall would be difficult or even impossible.
Which of the following is NOT correct about L2TP?
- It does not offer encryption.
- It is used as a VPN protocol.
- It is paired with IPSec.
- It must be used on HTML5 compliant devices.
-It must be used on HTML5 compliant devices.
Correct. L2TP does not have to be used in conjunction with HTML5.
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
- Stateful packet filtering
- Proxy firewall
- Connection-aware firewall
- Packet filtering firewall
-Stateful packet filtering
Stateful packet filtering uses both the firewall rules and the state of the connection: that is, whether the internal device requested each packet. A stateful packet filtering firewall keeps a record of the state of a connection between an internal endpoint and an external device.
Which type of monitoring methodology looks for statistical deviations from a baseline?
- Heuristic monitoring
- Behavioral monitoring
- Anomaly monitoring
- Signature-based monitoring
Anomaly monitoring is designed for detecting statistical anomalies.
Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?
- IP denier
- MAC pit
- DDoS Prevention System (DPS)
- DNS sinkhole
-DNS sinkhole
A DNS sinkhole changes a normal DNS request to a pre-configured IP address that points to a firewall that has a rule of Deny set for all packets so that every packet is dropped with no return information provided to the sender. DNS sinkholes are commonly used to counteract DDoS attacks. Many enterprises contract with a DDoS mitigation service that helps identify DDoS traffic so that it is sent to a sinkhole while allowing legitimate traffic to reach its destination.
Which of the following best describes east-west traffic?
- Movement of data from an unsecured endpoint to a server outside a data center
- Movement of data from a router to an enterprise switch
- Movement of data from one unsecured endpoint to another
- Movement of data from one server to another within a data center
-Movement of data from one server to another within a data center
East-west traffic refers to the movement of data from one server to another within a data center.
Which technology allows scattered users to be logically grouped even when they are connected to different physical switches?
- WAN
- VLAN
- LAN
- VPN
-VLAN
Virtual local area networks (VLAN) can logically group devices connected to different switches.
Which of the following best describes a host-based firewall?
- A host-based firewall is a hardware firewall that protects a single endpoint device.
- A host-based firewall is a hardware firewall that protects multiple endpoint devices.
- A host-based firewall is a software firewall that protects multiple endpoint devices.
- A host-based firewall is a software firewall that protects a single endpoint device.
-A host-based firewall is a software firewall that protects a single endpoint device.
A host-based firewall is a software-based firewall and can protect only the installed device.
Sansa is a network security administrator at an enterprise. She is asked to take appropriate steps to defend against a MAC address spoofing attack in the enterprise network. Which of the following methods should Sansa apply?
- Configure the switch so that only one port can be assigned per MAC address
- Increase the capacity of CAM to allow for an increased volume of MAC addresses
- Close all unused ports in the switch so that old MAC addresses are not allowed
- Configure the switch so that no changes can be done once a port is assigned to a MAC address
Configure the switch so that only one port can be assigned per MAC address
In an interview, Max was asked to tell one difference between a software firewall and a virtual firewall. How should Max answer?
- Virtual firewalls are cost-free, whereas software firewalls are paid services.
- Software firewalls can protect all the endpoints in a network, whereas virtual firewalls can protect only one device.
- Virtual firewalls are used on almost all devices, whereas software firewalls are mostly used by enterprises.
- Software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud.
Software firewalls are locally installed on a device, whereas virtual firewalls are hosted on the cloud.
In an interview, you are asked to analyze the following statements regarding secure network designs and choose the correct one. Which of the following should you choose?
- Switches can transfer packets when VLAN members on one switch need to communicate with members connected to another switch.
- Workgroup switches reside at the top of the hierarchy and carry traffic between switches.
- Load balancers can detect and stop protocol attacks directed at a server or application.
- Zero trust is designed to make a system trusted.
-Load balancers can detect and stop protocol attacks directed at a server or
As a cybersecurity expert, you are asked to take adequate measures to mitigate DDoS attacks on your enterprise servers. Which of the following techniques should you apply?
- You should set up a DNS sinkhole.
- You should set up a virtual private network.
- You should set up a proxy server.
- You should set up a host-based firewall.
-You should set up a DNS sinkhole.
When a Distributed denial of service (DDoS) attack is sensed in a network, the traffic is redirected to a DNS sinkhole that will never give the command-and-control server any response, as the packets will be dropped when they reach the DNS sinkhole.
An employee at your enterprise is caught violating company policies by transferring confidential data to his private email. As a security admin, you are asked to prevent this from happening in the future. Which of the following actions should you perform?
- You should set up a DLP.
- You should set up an ACL.
- You should set up a NAC.
- You should set up a VPN.
-You should set up a DLP.
Data loss prevention (DLP) continuously monitors confidential data, and if any suspicious activity is detected, it immediately generates an alert.
Which of the following is a network set up with intentional vulnerabilities?
- Virtual private network
- Honeypot
- Honeynet
- Sinkhole
-Honeynet
Correct. A honeynet refers to a network of honeypot’s made with intentional vulnerabilities to attract attackers.
Which of the following outlines the process of a proxy server?
- User - forward proxy - user - reverse proxy - Internet
- User - internet - reverse proxy - forward proxy - user
- User - forward proxy - Internet - reverse proxy - user
- User - reverse proxy - Internet - forward proxy - user
-User - forward proxy - Internet - reverse proxy - user
The traffic from the user is first intercepted by the forward proxy. The forward proxy then connects to the internet, and the data is sent to the reverse proxy. The reverse proxy then sends the data to the user.
Which statement regarding a demilitarized zone (DMZ) is NOT true?
- It typically includes an email or web server.
- It provides an extra degree of security.
- It can be configured to have one or two firewalls.
- It contains servers that are used only by internal network users.
-It contains servers that are used only by internal network users.
It contains servers that are used only by external and not internal network users.
Which of the following contains honeyfiles and fake telemetry?
- Honeypotnet
- Attacker-interaction honeypot
- High-interaction honeypot
- Honeyserver
-High-interaction honeypot
A high-interaction honeypot is designed for capturing much more information from the threat actor. Usually, it is configured with a default login and loaded with software, data files that appear to be authentic but are actually imitations of real data files (honeyfiles), and fake telemetry.
How does BPDU guard provide protection?
- It sends BPDU updates to all routers.
- All firewalls are configured to let BPDUs pass to the external network.
- BPDUs are encrypted so that attackers cannot see their contents.
- It detects when a BPDU is received from an endpoint.
-It detects when a BPDU is received from an endpoint.
After encountering a network attack in your enterprise network, the chief network security engineer assigned you a project. The project was to create a vulnerable network that is similar to your enterprise network and entices the threat actor to repeat the attack. This is to analyze the behavior and techniques the attacker is using to ensure better defenses to your enterprise network in the future. Which of the following appliances should you use?
- You should use a proxy server.
- You should use a honeypot.
- You should set up behavioral IDS monitoring.
- You should set up network access control.
-You should use a honeypot.
A honeypot can be used to mimic the original network and discover and analyze attack patterns.
Which of the following best describes an extranet?
- Additional network bandwidth being allocated
- Private network only accessed by an authorized party
- Public network accessed by proper authorization
- Private network accessed by the public
-Private network only accessed by an authorized party
An extranet is a private network that can only be accessed by an authorized party.
How do NACs ensure that a device is safe to connect to a secure network?
- The NAC moves suspicious data on an unknown device onto an external storage device.
- The NAC encrypts all of the data on an unknown device before connecting it to the secured network.
- The NAC ensures the safety of the device by deleting all suspicious files.
- The NAC issues a health certificate, only allowing healthy devices to connect to the secured network.
-The NAC issues a health certificate, only allowing healthy devices to connect to the secured network.
A network access control (NAC) issues a health certificate after analyzing the device, and the device can connect to the secure network only if it has good health.
Which protocol is used to prevent looping in a switch?
- STP
- SSTP
- SMTP
- SSL
-STP
Spanning-tree protocol (STP) helps prevent looping in the switch by finding the right path.
Which of the following is a deception instrument?
- Sinkhole
- Reverse proxy
- Forward proxy
- WAF
-Sinkhole
A sinkhole is a deception instrument used to attract attackers by intentionally creating vulnerable devices.
What is a jump box used for?
- Bypassing a firewall by generating a log entry
- Switching from a public IP to a private IP
- Restricting access to a demilitarized zone
- Deceiving threat actors by intentionally creating vulnerable devices
-Restricting access to a demilitarized zone
A jump box is used to restrict access to a demilitarized zone (DMZ) by enforcing strict standards so that only authorized admins can access it.