Network Security Flashcards
Which of the following is used for detection?
Video surveillance
Biometrics
Smart cards
Video surveillance
Video surveillance is used for detection. The other options are used for prevention
Which of the following is used for prevention?
Video
Tags
Key fob
Key fob
A key fob is a small hardware device used to authenticate a user. Requiring users to present a key fob can prevent unauthorized access. The other options are used for detection
Which of the following can identify a person by physical characteristics?
Key fob
Asset tracking tag
Biometrics
Biometrics
Biometrics are described as “something you are” and can be used to authenticate a person before permitting them to access a controlled IT resource
Which of the following represents a correct sequential order for AAA?
Accounting, Authentication, Authorization
Accounting, Authorization, Authentication
Authentication, Authorization, Accounting
Authentication, Authorization, Accounting
First you authenticate, then you are authorized to do certain things, and then everything you do is logged
Which two protocols are used by Microsoft domain controllers?
Kerberos and LDAP
RADIUS and TACACS+
Kerberos and RADIUS
Kerberos and LDAP
Kerberos is used for authenticating and granting tickets to other servers, and LDAP is implemented through Active Directory
What is used as the authentication server in 802.1X?
RADIUS server
TACACS+ server
DNS server
RADIUS server
A RADIUS server is found at the back end of an 802.1X infrastructure
Which of the following involves monitoring devices leaving specific ranges?
Geofencing
WPA
WPA2
Geofencing
Geofencing is the process of using a mobile device’s built-in GPS capabilities and mobile networking capabilities to set geographical constraints on where the mobile device can be used
Out of the following choices, which encryption standard should you choose to use on your Wi-Fi networks?
WEP2
WPA
WPA2
WPA2
You should choose WPA2, although by the time this book goes to print, WPA3 will be available
Which encryption algorithm is used by WPA2?
RC4
CCNP-RS
CCMP-AES
CCMP-AES
WPA2 uses CCMP-AES
What’s the only attack that does not depend on the use of technology?
Logic bomb
Social engineering
Brute force
Social engineering
Social engineering preys on humans who are gullible and naïve and doesn’t require the use of technology
Which word, when inserted into both blanks (without any changes to the word), makes the sentence true: A(n) ____ is used to ____ a vulnerability?
Risk
Threat
Exploit
Exploit
Exploit is both a verb (penetrate a system) and a noun (a tool or method used to penetrate the system)
Which one of these attacks requires the attacker to be on the same subnet as the victim?
ARP poisoning
DNS poisoning
Spoofing
ARP poisoning
ARP is a Layer 2 protocol and never leaves LANs, so an ARP poisoning attack requires the attacker to be on the same subnet as the victim. The other attacks can be performed from one network to another
Which one of these would not be considered a common password?
Jonathan
987654321
GYMaYMDa5!
GYMaYMDa5!
Common names, numbers, and words fall under the category of common passwords, and should never be used for any account
Which of these utilities can identify open ports?
traceroute
ipconfig
netstat
netstat
The netstat utility identifies open ports
Which of the following is a secure protocol?
HTTP
SSH
Telnet
SSH
SSH (Secure Shell) is the only listed protocol that’s secure