Network Security Flashcards

1
Q

Which of the following is used for detection?

Video surveillance

Biometrics

Smart cards

A

Video surveillance

Video surveillance is used for detection. The other options are used for prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is used for prevention?

Video

Tags

Key fob

A

Key fob

A key fob is a small hardware device used to authenticate a user. Requiring users to present a key fob can prevent unauthorized access. The other options are used for detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can identify a person by physical characteristics?

Key fob

Asset tracking tag

Biometrics

A

Biometrics

Biometrics are described as “something you are” and can be used to authenticate a person before permitting them to access a controlled IT resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following represents a correct sequential order for AAA?

Accounting, Authentication, Authorization

Accounting, Authorization, Authentication

Authentication, Authorization, Accounting

A

Authentication, Authorization, Accounting

First you authenticate, then you are authorized to do certain things, and then everything you do is logged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two protocols are used by Microsoft domain controllers?

Kerberos and LDAP

RADIUS and TACACS+

Kerberos and RADIUS

A

Kerberos and LDAP

Kerberos is used for authenticating and granting tickets to other servers, and LDAP is implemented through Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is used as the authentication server in 802.1X?

RADIUS server

TACACS+ server

DNS server

A

RADIUS server

A RADIUS server is found at the back end of an 802.1X infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following involves monitoring devices leaving specific ranges?

Geofencing

WPA

WPA2

A

Geofencing

Geofencing is the process of using a mobile device’s built-in GPS capabilities and mobile networking capabilities to set geographical constraints on where the mobile device can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Out of the following choices, which encryption standard should you choose to use on your Wi-Fi networks?

WEP2

WPA

WPA2

A

WPA2

You should choose WPA2, although by the time this book goes to print, WPA3 will be available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which encryption algorithm is used by WPA2?

RC4

CCNP-RS

CCMP-AES

A

CCMP-AES

WPA2 uses CCMP-AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the only attack that does not depend on the use of technology?

Logic bomb

Social engineering

Brute force

A

Social engineering

Social engineering preys on humans who are gullible and naïve and doesn’t require the use of technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which word, when inserted into both blanks (without any changes to the word), makes the sentence true: A(n) ____ is used to ____ a vulnerability?

Risk

Threat

Exploit

A

Exploit

Exploit is both a verb (penetrate a system) and a noun (a tool or method used to penetrate the system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one of these attacks requires the attacker to be on the same subnet as the victim?

ARP poisoning

DNS poisoning

Spoofing

A

ARP poisoning

ARP is a Layer 2 protocol and never leaves LANs, so an ARP poisoning attack requires the attacker to be on the same subnet as the victim. The other attacks can be performed from one network to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of these would not be considered a common password?

Jonathan

987654321

GYMaYMDa5!

A

GYMaYMDa5!

Common names, numbers, and words fall under the category of common passwords, and should never be used for any account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of these utilities can identify open ports?

traceroute

ipconfig

netstat

A

netstat

The netstat utility identifies open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a secure protocol?

HTTP

SSH

Telnet

A

SSH

SSH (Secure Shell) is the only listed protocol that’s secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pentesting involves which of the following?

Just finding vulnerabilities

Just exploiting vulnerabilities

Both finding and exploiting vulnerabilities

A

Both finding and exploiting vulnerabilities

Penetration testing involves both finding and exploiting vulnerabilities

17
Q

On which device would you configure STP, BPDU guard, root guard, and DHCP snooping?

Switch

Router

Firewall

A

Switch

STP, BPDU guard, root guard, and DHCP snooping are all switch mitigation techniques

18
Q

Why is the sensitive information on honeypots not a risk for organizations?

It’s encrypted.

It’s hashed.

It’s fake.

A

It’s fake.

Information on honeypots appears to be real but is always fake, intended to keep the attackers swimming around so that we can study their techniques