Network Attack Mitigation Flashcards
To which types of Azure resources can network security groups be associated with?
Instruction: Choose all options that best answer the question.
Answer Choices
Vnets
Virtual machines
Subnets
Network interfaces
Subnets
Network interfaces
Your organization uses Microsoft Active Directory with domain-joined computers. You need to deploy the same Windows Defender inbound rules to a subset of those computers. What should you do?
Instruction: Choose the option that best answers the question.
Answer Choices
Configure the rules on each computer
Configure a GPO targeting the appropriate computers, create inbound rules in the GPO
Configure the rules on one computer, export them, then import them to the remaining computers
Create a PowerShell script to create the rules; run the script on each computer
Configure a GPO targeting the appropriate computers, create inbound rules in the GPO
Which snort command starts the snort engine on Linux?
Instruction: Choose the option that best answers the question.
Answer Choices
snort -T console -i eth0
snort -A console -i eth0
snort -T console -I eth0 /etc/snort/snort.conf
snort -A console -i eth0 -c /etc/snort/snort.conf
snort -A console -i eth0 -c /etc/snort/snort.conf
Which type of firewall works up to layer 4 of the OSI model?
Instruction: Choose the option that best answers the question.
Answer Choices
Packet filtering
Content filtering
Reverse proxy
Forward proxy
Packet filtering
Which additional feature does an IPS provide over an IDS?
Instruction: Choose the option that best answers the question.
Answer Choices
Enhanced security rule configuration
Ability to send alerts when suspicious activity is detected
Ability to log suspicious activity
Ability to stock attacks in progress
Ability to stock attacks in progress
Which type of Azure Firewall rule allows access to a DNS name?
Instruction: Choose the option that best answers the question.
Answer Choices
NAT
Application
Proxy
Network
Application
Which are commonly used to configure firewall rules on Linux hosts?
Instruction: Choose all options that best answer the question.
Answer Choices
iptables
ipconfig
ifconfig
ufw
iptables
ufw
What is reverse proxying similar in concept to?
Instruction: Choose the option that best answers the question.
Answer Choices
Load balancing
Packet filtering
IPSec
Port forwarding
Load balancing