Network Security Exam Review Questions Flashcards
1) A company called TopFix was attacked with XSS and SQLi. To prevent this from happening again, they hired you to implement security measures. Which of the following would you implement?
A. IPS
B. DMZ
C. WAF
D. All of the above
D. All of the above
Chapter 1: Network Security Systems & Architecture Section 5: Network Security Systems page 19-20
2) To secure a connection to your company’s servers, you were asked to implement a proxy in the DMZ. Which kind of proxy would that be?
A. Intra-DMZ proxy
B. Remote proxy
C. Reverse proxy
D. Forward proxy
Reverse proxy is for the servers, behind the firewall
Chapter 1: Network Security Systems & Architecture: Section 4: Network Security Design page 17
3) The Dot1X authentication process failed, and during an investigation of the incident, it was concluded that the submitted credentials were not the same as those that were in the server.
Which component is at fault?
A. Supplicant
B. Sender
C. Authenticator
D. Authentication server
A. Supplicant
The supplicant, or client, is the device attempting to gain access to the network.
Chapter 2: Secure Management & Access: Section 3: 802.1X Authentication page 30
4) During an attack investigation, the NTP service was compromised. What kind of mitigation can you implement to resolve the issue?
A. Router Authentication
B. NTP Access Control
C. NTP Authentication
D. False Update Prevention
NTP Access Control - limit types of NTP access and NTP sources associating with out router.
Chapter 3 Network Attacks & Mitigation: Section 7: NTP Attacks page 55
5) During an attack investigation, it was concluded that the switch started acting like a hub. What could have happened to it?
A. The switch’s MAC table was flooded.
B. The switch’s violation mode changed to “shutdown”.
C. NTP authentication.
D. LLDP stopped working.
A. The switch’s MAC table was flooded.
Chapter 3 Network Attacks & Mitigation: Section 2: CAM Table Overflow page 36
6) While extracting a PK signed file, a JFIF signature was found within it. Based on the given signature, what was downloaded?
A. An executable file.
B. A zipped file.
C. An executable that opens an image.
D. A zipped jpeg file.
D. A zipped jpeg file.
Chapter 4: Network Traffic Analysis: Section 3: File Extraction page 71
7) While upgrading from HTTP to HTTPS, you noticed via Wireshark that the content is no longer readable. What is implemented in HTTPS that is not implemented in HTTP?
A. Encryption
B. Decoding
C. Encoding
D. Decryption
A. Encryption
Chapter 5: Practical Cryptography: Section 1: Cryptographic Concepts page 78
8) The organization you work for installed a new firewall. However, many notifications began flooding the blue team. What can be done to get rid of those notifications and stay protected?
A. Change Firewall action to Reject.
B. Change Firewall action to Drop.
C. Change Firewall action to Allow.
D. Change Firewall action to Hide.
B. Change Firewall action to Drop.
Chapter 6: Firewall Fundamentals: Section 1: Firewall Introduction page 92
9) The TopFix company requires VPN service to allow workers to access the resources from home. Which VPN type should the company implement?
A. Home-to-Site VPN
B. Remote Access VPN
C. Shared-Access VPN
D. Site-to-Site VPN
B. Remote Access VPN
Chapter 7: VPN Technologies: Section 3: Remote Access VPN page 105
10) SNMP is vulnerable to manipulation and allows attackers to obtain unauthorized access, because it is based on unsecure strings. What can be done to mitigate that problem?
A. Use public strings.
B. Downgrade to SNMPv2.
C. Upgrade to SNMPv3.
D. Switch to ACL implementation.
C. Upgrade to SNMPv3.
Chapter 8: Network Monitoring: Section 2: Simple Network Management Protocol page 115
11) John, a network administrator, suggested incorporating an IPS system in the network. He asks for your advice where to place it. Which of the following should you suggest?
A. Place the IPS on a gateway.
B. Place the IPS on a switch’s TAP port.
C. Place the IPS in the DMZ.
D. Place the IPS on the host computers.
A. Place the IPS on a gateway.
Chapter 9: IPS & IDS Concepts: Section 1: Intrusion Detection & Prevention page 127