Network Security Flashcards

1
Q

A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk’s wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?

A

MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A malicious user is blocking wireless devices from connecting to the Internet when people are in the coffee shop. What is the malicious user performing?

A

Frequency jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In what type of attack does the potential intruder trick a user into providing sensitive information?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technician is concerned about security and is asked to set up a network management protocol. Which network management protocol will provide the best security?

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following network concepts is prevented by using a split-horizon?

A

Routing loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An outside organization has completed a penetration test for a company. One of the report items reflects the ability to read SSL traffic from the webserver. What is the MOST likely mitigation for this reported item?

A

Ensure patches are deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company has just installed a VoIP system on their network. Prior to the installation, all of the switches were upgraded to layer 3 capable in order to more adequately route packets. What network segmentation technique is this an example of?

A

Performance optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network. Which of the following ACLs should the technician implement?

A

Permit SRCIP 192.168.0.0/24 Sport: ANY DSTIP: ANY DPORT 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following threats can policies, procedures, and end-user training help to effectively mitigate?

A

Social engineering attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their own laptop to that same switch port. Which of the following security features would BEST accomplish this goal?

A

Sticky MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet mask, and VLAN required to access the network. What type of attack might this be?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?

A

Video surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network engineer is designing a campus-wide wireless network. Wireless access points will be distributed across the campus for maximum availability. The network is to be designed to handle a large number of roaming wireless devices. What feature should he employ?

A

LWAPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your company has purchased a new building down the street for its executive suites. You have been asked to choose the best encryption for AP4 and AP5 in order to establish a secure wireless connection between the main building and the executive suites.

A

WPA2-CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A new network administrator is hired to replace a consultant who ran the network for several months and whose contract was just canceled. After a month of working on the network, the new network administrator realized some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem?

A

A backdoor has been installed to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router’s configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

A

The administrator has implemented a feature that only allows whitelist MAC addresses to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

You are trying to increase your network’s security by implementing a system of two-factor authentication (2FA). Which of the following authentication factors should you choose to meet this requirement?

A

Smartcard and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?

A

Application-aware firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Your company has just installed a new web server that will allow inbound connections over port 80 from the internet while not accepting any connections from the internal network. You have been asked where to place the web server in the network architecture and configure the ACL rule to support the requirements. The current network architecture is segmented using a firewall to create the following three zones:

ZONE INTERFACE, IP address
PUBLIC, eth0, 66.13.24.16/30
DMZ, eth1, 172.16.1.1/24
PRIVATE, eth2, 192.168.1.1/24

Based on the requirements and current network architecture above, what is the BEST recommendation?

A

Put the server in the DMZ with an inbound rule from eth0 to eth1 that allows port 80 traffic to the server’s IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a common technique used by malicious individuals to perform a man-in-the-middle attack on a wireless network?

A

Creating an evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?

A

Firmware updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Rick is upset that he was passed over for a promotion. He decides to take revenge on his nemesis, Mary, who got the job instead of him. Rick sets up a man-in-the-middle attack against Mary’s computer by redirecting any layer 2 traffic destined for the gateway to his own computer first. Rick is careful only to affect the traffic associated with Mary’s computer and not the entire network. Which type of man-in-the-middle attack is Rick conducting against Mary?

A

ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown devices are connected to the access point. What is MOST likely the cause of this issue?

A

A successful WPS attack has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

An employee of a highly-secure company needs to use facial recognition in addition to a username/password to establish a VPN successfully. What BEST describes this methodology?

A

Two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You are working at the service desk as a network security technician and just received the following email from an end-user who believes a phishing campaign is being attempted.

From: user@diontraining.com
To: abuse@diontraining.com
Subject: You won a free iPhone!

Dear Susan,

You have won a brand new iPhone!
Just click the following link to provide your address so we can ship it out to you this afternoon: (http://www.freephone.io:8080/winner.php)

What should you do to prevent any other employees from accessing the link in the email above while still allowing them access to any other webpages at the domain freephone.io?

A

Add http://www.freephone.io:8080/winner.php to the browser’s group policy block list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Your network is currently under attack from multiple hosts outside of the network. Which type of attack is most likely occurring?

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A company needs to implement stronger authentication by adding an authentication factor to its wireless system. The wireless system only supports WPA with pre-shared keys, but the back-end authentication system supports EAP and TTLS. What should the network administrator implement?

A

802.1x using EAP with MSCHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A facility would like to verify each individual’s identity before allowing access to its server room and data center. Additionally, the building should ensure that users do not tailgate behind other users. What solution would BEST meet these requirements?

A

Implement a biometric reader at the datacenter entrance and require passage through a mantrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. What solution would be BEST to achieve this?

A

RADIUS server and access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

(This is a simulated Performance-Based Question. On the real certification exam, you will be asked to drag-and-drop the correct antennas onto the APs.)

Your company has purchased a new building down the street for its executive suites. You have been asked to select an antenna for AP1, AP2, and AP3 to establish a wireless connection inside the main building for visitors to use.

A

5 dB directional right for AP1, 5 dB omnidirectional for AP2, and 5 dB directional left for AP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Sarah connects a pair of switches using redundant links. When she checks the links’ status, one of them is not active, even when she changes ports. What MOST likely disabled the redundant connection to the other switch?

A

Spanning tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?

A

Shared secret key is mismatched

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

An increased amount of web traffic to an e-commerce server is observed by a network administrator but without increasing the number of financial transactions. Which kind of attack might the company be experiencing?

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

A company has a secondary datacenter in a remote location. The data center staff handles cable management and power management. The building’s security is also handled by the data center staff with little oversight from the company. Which of the following should the technician do to follow the best practices?

A

Ensure rack security is performed

37
Q

What would provide the highest level of physical security for the client if they are concerned with the theft of equipment from the data center?

A

Man trap

38
Q

Your company has just hired a contractor to attempt to exploit a weakness in your network to identify all their vulnerabilities. This person has been permitting to perform these actions and only conduct their actions within the contract’s scope of work. Which of the following will be conducted by the contractor?

A

Penetration testing

39
Q

A network technician is tasked with designing a firewall to improve security for an existing FTP server on the company network and is accessible from the Internet. The security personnel are concerned that the FTP server is compromised and is possibly being used to attack other company servers. What is the BEST way to mitigate this risk?

A

move the sever to the company’s DMZ

40
Q

An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. What is the employee MOST likely using?

A

Proxy server

41
Q

A NAC service has discovered a virus on a client’s laptop. What location should the NAC service put the laptop in?

A

Quarantine network

42
Q

You work for a fast-food restaurant installing a new electronic signboard to display their menu items to customers. The signboard is connected to the network. It came preconfigured with a public IP address so that the central office can connect to it remotely to update the menu items and prices being displayed. One of the employees unboxed the new device, installed this new signboard by hanging it on the wall and plugging it into the network. When you arrive at work the next day, you see that the menu items have all been changed to include vulgar names and prices like $6.66. It appears the signboard has been hacked and is being used for digital vandalism. What is the MOST likely reason the attackers were able to access the signboard?

A

The signboard’s default credentials were never changed during installation

43
Q

The network administrator noticed that the border router has high network capacity loading during non-working hours. This load is causing web services outages. Which of the following is the MOST likely cause of the issue?

A

Distributed DoS

44
Q

A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. They intend to use two-factor authentication to accomplish this. Which of these BEST represents two-factor authentication?

A

Password and key fob

45
Q

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?

A

TACACS+

46
Q

A technician is installing a network firewall and would like to block all WAN to LAN traffic that is using ports other than the default ports for Internet and email connectivity. What rule should the technician verify FIRST?

A

An implicit deny is enabled

47
Q

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location to be reviewed. A recent exploit has caused the company’s encryption to become insecure. What would be required to resolve the exploit?

A

Install recommended updates

48
Q

Which of the following must be added to a VLAN with a gateway to add security to it?

A

An ACL

49
Q

What is the term for exploiting a weakness in a user’s wireless headset to compromise their smartphone?

A

Bluejacking

50
Q

Which of the following should be implemented to allow wireless network access for clients in the lobby using a password key?

A

WPA2

51
Q

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using computers should not access the Internet. What rule on the firewall should the technician configure to prevent student access to the Internet?

A

Block all LAN to WAN traffic

52
Q

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?

A

RADIUS

53
Q

A network technician needs to protect IP-based servers in the network DMZ from an intruder trying to discover them. What should the network technician do to protect the network from ping sweeps?

A

Block ICMP at the firewall

54
Q

(This is a simulated Performance-Based Question. On the real certification exam, you would be asked to drag-and-drop the correct encryption onto the APs.)

Your company has purchased a new building down the street for its executive suites. You have been asked to choose the BEST encryption for AP1, AP2, and AP3 to establish a wireless connection inside the main building for visitors to use. Your boss has stated that the main building’s internal wireless network is for visitors’ use only and MUST NOT require the visitors to set up any special configuration on their devices to connect.

A

Open

55
Q

What is used to authenticate remote workers who connect from offsite?

A

802.1x

56
Q

What is BEST used to perform a one-time temporary posture assessment in a NAC environment?

A

Non-persistent agent

57
Q

What anti-malware solution should be implemented to deter attackers from loading custom files onto a distributed target platform?

A

Network-based anti-malware

58
Q

The physical security manager has asked you to assist with his risk assessment of his proposed security measures. He is concerned that during a power outage, the server room might be targeted for attack. Luckily, he has many different protection measures in place to keep intruders out of the server room. During a power outage, which of the following security controls would still be usable?

A

Door locks

59
Q

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

A

RADIUS

60
Q

A network architect is designing a highly-redundant network with a distance vector routing protocol to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?

A

Route poisoning

61
Q

You want to ensure that only one person can enter or leave the server room at a time. Which of the following physical security devices would BEST help you meet this requirement?

A

Mantrap

62
Q

The network technician has received a large number of complaints from users that there is poor network performance. The network technician suspects a user may have created a malicious flood on the network with many ping requests. What should the technician do?

A

Block all ICMP request

63
Q

A network technician is responsible for the basic security of the network. Management has asked if there is a way to improve the level of access users have to the company file server. Right now, any employee can upload and download files with basic system authentication (username and password). What should he configure to increase security?

A

Multi-factor authentication

64
Q

A project lead reviews the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The work statement specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indicating weaknesses in the infrastructure. Based on this scope of work, what type of activity is to be performed?

A

Penetration testing

65
Q

A network engineer has been tasked with designing a network for a new branch office with approximately 50 network devices. This branch office will connect to the other offices via a MAN. Many of the other branch offices use off-the-shelf SOHO equipment. It is a requirement that the routing protocol chosen use the least amount of overhead. Additionally, all the computers on the network will be part of a single VLAN. The connection between these computers should produce the highest throughput possible in the most cost-effective manner. What devices would be MOST appropriate?

A

A router should be used as a gateway device, with RIPv2 as the routing protocol. The computers should be connected with a Gigabit Layer 2 switch

66
Q

A user is receiving certificate errors in other languages within their web browser when accessing your company’s website. Which of the following is the MOST likely cause of this issue?

A

Man in the middle

67
Q

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

A

WPA personal

68
Q

A network technician has designed a network consisting of an external Internet connection, a DMZ, an internal private network, and an administrative network. From which network segment should all routers and switches be configured to accept SSH connections?

A

Administrative network allowing only admin access

69
Q

Mallory is unhappy with her job at a large beverage company. She decides to steal sensitive information about the company’s proprietary formula for a new energy drink. She installs a keylogger onto some of the product team’s workstations, which then emails out the information to her personal email account each evening so she can post the information to WikiLeaks. How would you best classify Mallory and her actions?

A

Insider threat

70
Q

A company has had several virus infections over the past few months. The cause was vulnerabilities in the software applications in use. What should an administrator implement to prevent future outbreaks?

A

Patch management

71
Q

A network technician must allow HTTP traffic from the Internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of?

A

Port forwarding

72
Q

What benefit does network segmentation provide?

A

Security through isolation

73
Q

Which type of security measure is used to control access to an area by using a retina scan?

A

Biometic

74
Q

After an employee connected one of the switch ports on a SOHO router to the office’s wall jack, other employees in the building started losing network connectivity. Which of the following could be implemented on the company’s switch to prevent this type of loss of connection?

A

DHCP snooping

75
Q

During a recent penetration test, it was discovered that your company’s wireless network could be reached from the parking lot. The Chief Security Officer has submitted a change request to your network engineering team to solve this issue because he wants to ensure that the wireless network is only accessible from within the building. Based on these requirements, which of the following settings should be changed to ensure the wireless signal doesn’t extend beyond your building’s interior while maintaining a high level of availability to your users?

A

Power level

76
Q

A technician wants to implement a network for testing remote devices before connecting to the corporate network. What could the technician implement to meet this requirement?

A

Quarantine

77
Q

What common technique is used by malicious individuals to perform a man-in-the-middle attack on a wireless network?

A

Creating an evil twin

78
Q

A network administrator follows the best practices to implement firewalls, patch management, and policies on his network. Which of the following should be performed to verify that the security controls are in place?

A

Penetration testing

79
Q

A network technician needs to set up two public-facing web servers and ensure that the intruder cannot access its intranet if the servers are compromised. Which of the following methods should the technician use?

A

Place them in the demilitarized zone

80
Q

A user is receiving certificate errors in other languages in their web browser when accessing the company’s main intranet site. Which of the following is the MOST likely cause of the issue?

A

Man in the middle

81
Q

A client is concerned about a hacker compromising a network to gain access to confidential research data. What could be implemented to redirect any attackers on the network?

A

Honeypot

82
Q

A firewall technician configures a firewall to allow HTTP traffic as follows:

Source IP Zone Dest IP Zone Port Action
Any Untrust Any DMZ 80 Allow The organization should upgrade to what technology to prevent unauthorized traffic from traversing the firewall?

A

Application aware firewall

83
Q

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. What type of attack is this an example of?

A

ARP cache poisoning

84
Q

When a switch has multiple paths to reach the root bridge, what state is the port with the LEAST desirable path placed by the spanning tree protocol?

A

Blocking

85
Q

Which attack utilizes a wireless access point made to look as if it belongs to the network to eavesdrop on the wireless traffic?

A

Evil twin

86
Q

What is the BEST way to secure the most vulnerable attack vector for a network?

A

Provide end user awareness training for office staff

87
Q

You want to install a perimeter device on the network that will help ensure FTP commands are not being sent out over port 25. Which of the following devices would allow for deep packet inspection to catch this type of activity?

A

Layer 7 firewall

88
Q

Which of the following is the BEST way to regularly prevent different security threats from occurring within your network?

A

User training and awareness