Obj 4.X Flashcards
Dion Training utilizes a wired network throughout the building to provide network connectivity. Jason is concerned that a visitor might plug their laptop into a CAT 5e wall jack in the lobby and access the corporate network. What technology should be utilized to prevent users from gaining access to network resources if they can plug their laptops into the network?
VPN
UTM
DMZ
NAC
The correct answer is NAC (Network Access Control). NAC is a security solution that restricts access to the network unless a device meets certain criteria. This can include factors such as device health, user authentication, or whether it’s a known and trusted device. In this scenario, NAC would prevent unauthorized devices from accessing the corporate network simply by plugging into the wall jack.
The other choices are incorrect because they don’t directly address the problem. A VPN (Virtual Private Network) is used for secure remote access to a network, not for controlling access to a wired connection on-site. A UTM (Unified Threat Management) device is a comprehensive security solution that includes firewalls, anti-virus, and more, but it doesn’t specifically prevent a device from plugging into a network port. A DMZ (Demilitarized Zone) is a portion of the network that is exposed to untrusted users, often used for web servers, but it doesn’t stop unauthorized users from accessing the internal network.
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
WPA2 Enterprise
WEP
WPA personal
MAC filtering
The correct answer is WPA Personal. WPA Personal, also known as WPA2-PSK (Pre-Shared Key), provides a strong level of encryption without the need for an additional authentication server. It uses AES (Advanced Encryption Standard) encryption, which is much stronger than older protocols like WEP.
The other choices are incorrect because they either require additional authentication methods or provide weaker security. WPA2 Enterprise uses a more secure authentication method involving a RADIUS server, which the question specifically says the administrator does not want to use. WEP is outdated and offers very weak encryption, making it insecure for modern networks. MAC filtering is not an encryption method; it simply restricts access based on device MAC addresses, but it can easily be bypassed and does not provide data encryption.
A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?
IDS is blocking RADIUS
Shared secret key is mismatched
Username is misspelled in the device configuration file
Group policy has not propagated to the device
The most likely reason for the problem is that the shared secret key is mismatched. When configuring AAA (Authentication, Authorization, and Accounting) using LDAP or any RADIUS server, both the server and the network device must have the same shared secret key for authentication to work. If this key does not match, the device will reject the LDAP credentials.
The other options are less likely. IDS blocking RADIUS would typically affect all RADIUS authentication attempts, not just LDAP. If the username were misspelled in the device configuration file, that could cause issues, but it would usually be evident when attempting to log in, as the device would indicate an invalid username. Lastly, group policy not propagating to the device could affect access, but it typically wouldn’t prevent a successful login if the LDAP credentials are correct and properly configured.
Which of the following must be added to a VLAN’s gateway to improve the security of the VLAN?
Spanning tree protocol
Access control list
Split horizon
Hold down timer
The correct answer is Access Control List (ACL). An ACL is used to define rules that control the traffic allowed to enter or leave the VLAN through the gateway. By implementing an ACL, you can restrict which devices or types of traffic are permitted to communicate with the VLAN, thereby enhancing security.
The other options are incorrect because they serve different purposes. Spanning Tree Protocol (STP) is used to prevent network loops in a switched environment but doesn’t directly improve security at the VLAN gateway. Split horizon is a routing technique used to prevent routing loops in distance-vector routing protocols, but it doesn’t affect VLAN security. A hold down timer is used in routing protocols to prevent premature route updates, but it doesn’t improve VLAN security.
You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
802.1x
NAC
ACL
Port security
The correct answer is Port security. Port security is a feature that allows a network administrator to restrict a switch port to a specific MAC address (Layer 2 address). Once a MAC address is learned or manually assigned to the port, the switch will prevent other devices with different MAC addresses from connecting to that port. This helps prevent an insider from unplugging a device and connecting their own unauthorized laptop.
The other options are incorrect because they serve different purposes. 802.1x is a network access control protocol used for authenticating devices, but it doesn’t specifically prevent MAC address spoofing or switching devices at the port level. NAC (Network Access Control) ensures that devices meet security policies before accessing the network but is more comprehensive and doesn’t focus solely on Layer 2 MAC address restrictions. An ACL (Access Control List) controls network traffic by defining rules for allowing or denying packets based on various criteria, but it doesn’t specifically address port-level device changes.
A home user reports to a network technician that the Internet is slow when they attempt to use their smartphone or laptop with their Wi-Fi network. The network administrator logs into the admin area of the user’s access point and discovers that multiple unknown devices are connected to it. What is MOST likely the cause of this issue?
The user is connected to a botnet
An evil twin has been implemented
The user is experiencing ARP poisoning
A successful WPS attack has occurred
The correct answer is A successful WPS attack has occurred. Wi-Fi Protected Setup (WPS) is a method for easily connecting devices to a wireless network, but it has known security vulnerabilities. Attackers can exploit WPS to gain unauthorized access to a Wi-Fi network, allowing multiple unknown devices to connect and potentially slow down the user’s internet by consuming bandwidth.
The other options are incorrect because they do not directly explain the presence of multiple unknown devices. A botnet would involve the user’s devices being compromised and used for malicious activity, but it wouldn’t necessarily result in unknown devices connecting to the Wi-Fi. An evil twin attack involves creating a fake access point to trick users into connecting, not adding unknown devices to a legitimate access point. ARP poisoning can lead to network redirection or data interception but wouldn’t cause unknown devices to connect to the Wi-Fi.
You are working as a network administrator for Dion Training. The company has decided to allow employees to connect their devices to the corporate wireless network under a new BYOD policy. You have been asked to separate the corporate network into an administrative network (for corporate-owned devices) and an untrusted network (for employee-owned devices). Which of the following technologies should you implement to achieve this goal?
VLAN
MAC filtering
VPN
WPA2
The correct answer is VLAN (Virtual Local Area Network). Implementing VLANs allows you to segment the corporate network into separate logical networks. By creating one VLAN for corporate-owned devices (the administrative network) and another for employee-owned devices (the untrusted network), you can enhance security and manage traffic more effectively. This separation ensures that the untrusted devices do not have access to sensitive corporate resources.
The other options are incorrect for the following reasons. MAC filtering can restrict devices based on their MAC addresses, but it is not as effective or scalable as VLANs for network segmentation. VPN (Virtual Private Network) is used for secure remote access to the corporate network but does not inherently separate devices within the network. WPA2 (Wi-Fi Protected Access 2) is a security protocol for wireless networks, but it does not provide network segmentation; it primarily secures the wireless connection itself.
Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (SELECT TWO)
NAC
Port security
GPS location
Geo-IP
The correct selections are NAC (Network Access Control) and GPS location. NAC solutions can enforce policies that restrict access to the network based on the physical location of the user, ensuring that only devices within the specified building or premises can authenticate and gain access. This can include checks on whether devices are connected to the correct network or if they meet certain compliance criteria.
GPS location can also be utilized to verify the physical location of users attempting to log in. By using GPS data, the system can determine if a user is within an acceptable geographic boundary before granting network access.
The other options are incorrect for the following reasons. Port security primarily focuses on controlling access to a network switch port by restricting the MAC addresses that can connect, rather than determining the physical location of users. Geo-IP can be used to approximate a user’s location based on their IP address, but it is not as precise as GPS for confirming that a user is in the same building, as IP addresses can sometimes be associated with a broader geographic area. Therefore, NAC and GPS location are the best choices for ensuring users are physically in the same building as the network they are attempting to access.
What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?
An evil twin
Session hijacking
ARP spoofing
Amplified DNS attacks
The correct answer is an evil twin. An evil twin attack involves setting up a rogue access point that mimics a legitimate wireless network. Users may unknowingly connect to this malicious access point, allowing the attacker to intercept communications, capture sensitive data, and potentially launch further attacks on the victims.
The other options are incorrect for the following reasons. Session hijacking typically refers to taking over an active session after it has been established, often through methods like cookie theft, rather than targeting the initial connection. ARP spoofing is a technique used primarily in wired networks, where an attacker sends falsified ARP messages over a local area network to associate their MAC address with the IP address of another device, but it is not specifically a wireless attack method. Amplified DNS attacks involve using DNS servers to amplify traffic directed at a target, usually as part of a DDoS attack, and are not related to on-path attacks in a wireless context. Therefore, an evil twin is the correct answer for a common technique used to perform an on-path attack on a wireless network.
Dion Training allows its visiting business partners from CompTIA to use an available Ethernet port in their conference room to establish a VPN connection back to the CompTIA internal network. The CompTIA employees should obtain internet access from the Ethernet port in the conference room, but nowhere else in the building. Additionally, if any of the Dion Training employees use the same Ethernet port in the conference room, they should access Dion Training’s secure internal network. Which of the following technologies would allow you to configure this port and support both requirements?
MAC filtering
Configure a SIEM
Create an ACL to allow access
Implement NAC
The correct answer is Implement NAC (Network Access Control).
Network Access Control (NAC) allows you to manage and enforce policies for devices connecting to a network. By implementing NAC, you can ensure that visiting business partners from CompTIA can establish a VPN connection and access the internet only through the designated Ethernet port in the conference room. At the same time, NAC can restrict access for Dion Training employees using the same port, allowing them to connect to the internal secure network.
For the exam, remember that NAC is essential for dynamic access control, providing different network access based on the user’s identity and device status. This technology is particularly useful in environments with multiple user types needing varied access levels.
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
Kerberos
CHAP
TACACS+
RADIUS
The correct answer is TACACS+. TACACS+ was developed by Cisco to provide centralized authentication, authorization, and accounting (AAA) services for network devices. It offers a flexible and secure method to control user access and track their activities.
The other options are incorrect. Kerberos is a widely used protocol for network authentication that operates on a ticket-granting system, but it’s not specific to Cisco. CHAP is used for authentication over Point-to-Point Protocol (PPP) connections but doesn’t provide full AAA services. RADIUS provides AAA services as well, but it is not Cisco-developed and differs from TACACS+ in terms of encryption and protocol structure.
Your company has several small branch offices around the country, but you work as a network administrator at the centralized headquarters building. You need the capability of being able to remotely access any of the remote site’s routers to configure them without having to fly to each location in person. Your company’s CIO is worried that allowing remote access could allow an attacker to gain administrative access to the company’s network devices. Which of the following is the MOST secure way to prevent this from occurring while still allowing you to access the devices remotely?
Install an out-of-band modem
Create an out-of-band management network
Configure the remote router’s ACLs to only permit Telnet traffic
Configure the remote router’s ACLs to only permit HTTP traffic
The correct answer is to create an out-of-band management network. An out-of-band management network separates management traffic from regular network traffic, allowing you to securely access network devices remotely without exposing the management interfaces to potential attackers on the main network.
The other options are less secure. Installing an out-of-band modem can allow remote access, but it doesn’t provide the same level of security and monitoring as a dedicated out-of-band management network. Configuring ACLs to only permit Telnet traffic is insecure because Telnet sends data in plaintext, making it vulnerable to interception. Similarly, permitting HTTP traffic is insecure because it doesn’t encrypt data, leaving it open to potential attacks.
An outside organization has completed a penetration test for a company. One of the report items states that an attacker may have the ability to read TLS traffic from the webserver due to a software bug. What is the MOST likely mitigation for this reported item?
Ensure patches are deployed
Configure the firewall to block traffic on port 443
Install an IDS on the network
Implement a VPN for employees
The most likely mitigation for the reported item is to ensure patches are deployed. Software bugs that affect the security of TLS traffic can often be resolved through updates and patches provided by the software vendor. By applying these patches, the organization can fix the vulnerabilities that may allow an attacker to read encrypted traffic.
Configuring the firewall to block traffic on port 443 would not be a viable solution, as this would block all secure web traffic, impacting legitimate users. Installing an Intrusion Detection System (IDS) could help in monitoring for suspicious activity but would not directly address the software bug. Implementing a VPN might enhance security for remote users, but it wouldn’t fix the vulnerability in the web server’s TLS implementation.
A user’s smartphone is displaying text in other languages in their web browser when accessing the company’s main website. Which of the following is the MOST likely cause of the issue?
Deauthentication attack
On-path attack
Denial-of-service attack
Reflective DNS attacks
The most likely cause of the issue is an on-path attack. In this scenario, the user’s smartphone is displaying text in other languages, which suggests that an attacker may be intercepting or modifying the communication between the smartphone and the company’s website. This type of attack allows an attacker to manipulate the content being sent to the user, potentially redirecting them to a malicious version of the site or altering the data received.
A deauthentication attack typically disconnects users from a network, while a denial-of-service attack aims to make a service unavailable. Reflective DNS attacks generally involve redirecting traffic to a malicious server using DNS manipulation, but they do not specifically cause the display of different languages in web content. Therefore, the on-path attack is the most relevant explanation for the observed behavior.
A disgruntled employee executes an on-path attack on the company’s network. Layer 2 traffic destined for the gateway is now being redirected to the employee’s computer. What type of attack is this an example of?
IP spoofing
Evil twin
Reflective DNS
ARP spoofing
The attack described is an example of ARP spoofing. In this scenario, the disgruntled employee is intercepting Layer 2 traffic by sending falsified Address Resolution Protocol (ARP) messages onto the network. This allows the attacker to associate their MAC address with the IP address of the gateway, effectively redirecting traffic that should go to the gateway to their own computer instead.
IP spoofing involves forging the source IP address of packets but does not specifically address Layer 2 traffic. An evil twin attack typically involves setting up a rogue Wi-Fi access point to trick users into connecting to it. Reflective DNS attacks manipulate DNS responses but are not related to ARP or Layer 2 traffic redirection. Therefore, ARP spoofing is the most accurate answer in this context.