Network Security Flashcards
A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk’s wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?
MAC filtering
A malicious user is blocking wireless devices from connecting to the Internet when people are in the coffee shop. What is the malicious user performing?
Frequency jamming
In what type of attack does the potential intruder trick a user into providing sensitive information?
Social engineering
A technician is concerned about security and is asked to set up a network management protocol. Which network management protocol will provide the best security?
SNMPv3
Which of the following network concepts is prevented by using a split-horizon?
Routing loops
An outside organization has completed a penetration test for a company. One of the report items reflects the ability to read SSL traffic from the webserver. What is the MOST likely mitigation for this reported item?
Ensure patches are deployed
A company has just installed a VoIP system on their network. Prior to the installation, all of the switches were upgraded to layer 3 capable in order to more adequately route packets. What network segmentation technique is this an example of?
Performance optimization
A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACLs should the technician implement?
Permit SRCIP 192.168.0.0/24 Sport: ANY DSTIP: ANY DPORT 80
Which of the following threats can policies, procedures, and end-user training help to effectively mitigate?
Social engineering attempts
You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
Sticky MAC
A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?
Social engineering
Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?
Video surveillance
A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. What feature should he employ?
LWAPP
Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?
SSL
Your company has purchased a new building down the street for its executive suites. You have been asked to choose the best encryption for AP4 and AP5 in order to establish a secure wireless connection between the main building and the executive suites.
WPA2-CCMP
A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?
A backdoor has been installed to access the network
Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router’s configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?
The administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network
You are trying to increase your network’s security by implementing a system of two-factor authentication (2FA). Which of the following authentication factors should you choose to meet this requirement?
Smartcard and PIN
A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?
Application-aware firewall
Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not accepting any connections from the internal network. You have been asked where to place the web server in the network architecture and configure the ACL rule to support the requirements. The current network architecture is segmented using a firewall to create the following three zones:
ZONE INTERFACE, IP address
PUBLIC, eth0, 66.13.24.16/30
DMZ, eth1, 172.16.1.1/24
PRIVATE, eth2, 192.168.1.1/24
Based on the requirements and current network architecture above, what is the BEST recommendation?
Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server’s IP
What is a common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network?
Creating an evil twin
A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?
Firmware updates
Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary’s computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful only to affect the traffic associated with Mary’s computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary?
ARP cache poisoning
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause of this issue?
A successful WPS attack has occurred
An employee of a highly-secure company needs to use facial recognition in addition to a username/password to establish a VPN successfully. What BEST describes this methodology?
Two-factor authentication
You are working at the service desk as a network security technician and just received the following email from an end-user who believes a phishing campaign is being attempted.
From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!
Dear Susan,
You have won a brand new iPhone!
Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php)
What should you do to prevent any other employees from accessing the link in the email above while still allowing them access to any other webpages at the domain freephone.io?
Add http://www.freephone.io:8080/winner.php to the browser’s group policy block list
Your network is currently under attack from multiple hosts outside of the network. Which type of attack is most likely occurring?
DDoS
A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement?
802.1x using EAP with MSCHAPv2
A facility would like to verify each individual’s identity before allowing access to its server room and data center. Additionally, the building should ensure that users do not tailgate behind other users. What solution would BEST meet these requirements?
Implement a biometric reader at the datacenter entrance and require passage through a mantrap
A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. What solution would be BEST to achieve this?
RADIUS server and access point
(This is a simulated Performance-Based Question. On the real certification exam, you will be asked to drag-and-drop the correct antennas onto the APs.)
Your company has purchased a new building down the street for its executive suites. You have been asked to select an antenna for AP1, AP2, and AP3 to establish a wireless connection inside the main building for visitors to use.
5 dB directional right for AP1, 5 dB omnidirectional for AP2, and 5 dB directional left for AP3
Sarah connects a pair of switches using redundant links. When she checks the links’ status, one of them is not active, even when she changes ports. What MOST likely disabled the redundant connection to the other switch?
Spanning tree
A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?
Shared secret key is mismatched
An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?
DoS
What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?
802.1x