Modules 24-25 Flashcards

1
Q

Which ICMP message type should be stopped inbound?

  • source quench
  • echo-reply
  • echo
  • unreachable
A

Echo

The echo ICMP packet should not be allowed inbound on an interface. The echo-reply should be allowed so that when an internal device pings an external device, the reply is allowed to return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can IMAP be a security threat to a company?

  • Someone inadvertently clicks on a hidden iFrame.
  • Encrypted data is decrypted.
  • An email can be used to bring malware to a host.
  • It can be used to encode stolen data and send to a threat actor.
A

An email can be used to bring malware to a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two technologies are primarily used on peer-to-peer networks? (Choose two.)

  • Bitcoin
  • BitTorrent
  • Wireshark
  • Darknet
  • Snort
A

Bitcoin
BitTorrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol is exploited by cybercriminals who create malicious iFrames?

  • HTTP
  • ARP
  • DHCP
  • DNS
A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which method is used by some malware to transfer files from infected hosts to a threat actor host?

  • UDP infiltration
  • ICMP tunneling
  • HTTPS traffic encryption
  • iFrame injection
A

ICMP tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why does HTTPS technology add complexity to network security monitoring?

  • HTTPS dynamically changes the port number on the web server.
  • HTTPS uses tunneling technology for confidentiality.
  • HTTPS hides the true source IP address using NAT/PAT.
  • HTTPS conceals data traffic through end-to-end encryption.
A

HTTPS conceals data traffic through end-to-end encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which approach is intended to prevent exploits that target syslog?

  • Use a Linux-based server.
  • Use syslog-ng.
  • Create an ACL that permits only TCP traffic to the syslog server.
  • Use a VPN between a syslog client and the syslog server.
A

Use syslog-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of attack is carried out by threat actors against a network to determine which IP addresses, protocols, and ports are allowed by ACLs?

  • phishing
  • denial of service
  • reconnaissance
  • social engineering
A

reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two application layer protocols manage the exchange of messages between a client with a web browser and a remote web server? (Choose two.)

  • HTTP
  • HTTPS
  • DNS
  • DHCP
  • HTML
A

HTTP
HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Tor?

  • a rule created in order to match a signature of a known exploit
  • a software platform and network of P2P hosts that function as Internet routers
  • a way to share processors between network devices across the Internet
  • a type of Instant Messaging (IM) software used on the darknet
A

a software platform and network of P2P hosts that function as Internet routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol is a name resolution protocol often used by malware to communicate with command-and-control (CnC) servers?

  • IMAP
  • DNS
  • HTTPS
  • ICMP
A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which technique is necessary to ensure a private transfer of data using a VPN?

  • authorization
  • scalability
  • encryption
  • virtualization
A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which technology would be used to create the server logs generated by network devices and reviewed by an entry level network person who works the night shift at a data center?

  • syslog
  • NAT
  • ACL
  • VPN
A

syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which two tools have a GUI interface and can be used to view and analyze full packet captures? (Choose two.)

  • nfdump
  • Wireshark
  • Cisco Prime Network Analysis Module
  • tcpdump
  • Splunk
A

Wireshark
Cisco Prime Network Analysis Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement describes statistical data in network security monitoring processes?

  • It is created through an analysis of other forms of network data.
  • It contains conversations between network hosts.
  • It shows the results of network activities between network hosts.
  • It lists each alert message along with statistical information.
A

It is created through an analysis of other forms of network data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Windows log contains information about installations of software, including Windows updates?

  • system logs
  • application logs
  • setup logs
  • security logs
A

setup logs

17
Q

Which function is provided by the Sguil application?

  • It reports conversations between hosts on the network.
  • It makes Snort-generated alerts readable and searchable.
  • It detects potential network intrusions.
  • It prevents malware from attacking a host.
A

It makes Snort-generated alerts readable and searchable.

18
Q

Which statement describes a Cisco Web Security Appliance (WSA)?

  • It protects a web server by preventing security threats from accessing the server.
  • It provides high performance web services.
  • It acts as an SSL-based VPN server for an enterprise.
  • It functions as a web proxy.
A

It functions as a web proxy.

19
Q

Which Cisco appliance can be used to filter network traffic contents to report and deny traffic based on the web server reputation?

  • WSA
  • AVC
  • ASA
  • ESA
A

WSA

20
Q

What does it indicate if the timestamp in the HEADER section of a syslog message is preceded by a period or asterisk symbol?

  • There is a problem associated with NTP.
  • The timestamp represents the round trip duration value.
  • The syslog message should be treated with high priority.
  • The syslog message indicates the time an email is received.
A

There is a problem associated with NTP

21
Q

Which information can be provided by the Cisco NetFlow utility?

  • peak usage times and traffic routing
  • security and user account restrictions
  • IDS and IPS capabilities
  • source and destination UDP port mapping
A

peak usage times and traffic routing

22
Q

How does a web proxy device provide data loss prevention (DLP) for an enterprise?

  • by functioning as a firewall
  • by inspecting incoming traffic for potential exploits
  • by scanning and logging outgoing traffic
  • by checking the reputation of external web servers
A

by scanning and logging outgoing traffic

23
Q

A system administrator runs a file scan utility on a Windows PC and notices a file lsass.exe in the Program Files directory. What should the administrator do?

  • Delete the file because it is probably malware.
  • Move it to Program Files (x86) because it is a 32bit application.
  • Uninstall the lsass application because it is a legacy application and no longer required by Windows.
  • Open the Task Manager, right-click on the lsass process and choose End Task .
A

Delete the file because it is probably malware

24
Q

Which technique would a threat actor use to disguise traces of an ongoing exploit?

  • Create an invisible iFrame on a web page.
  • Corrupt time information by attacking the NTP infrastructure.
  • Encapsulate other protocols within DNS to evade security measures.
  • Use SSL to encapsulate malware.
A

Corrupt time information by attacking the NTP infrastructure

25
Q

Which technique is necessary to ensure a private transfer of data using a VPN?

  • authorization
  • scalability
  • encryption
  • virtualization
A

encryption

26
Q

Refer to the exhibit. A network administrator is viewing some output on the Netflow collector. What can be determined from the output of the traffic flow shown?

  • This is a UDP DNS request to a DNS server.
  • This is a UDP DNS response to a client machine.
  • This is a TCP DNS request to a DNS server.
  • This is a TCP DNS response to a client machine.
A

This is a UDP DNS response to a client machine.