Practice (6) Flashcards

1
Q

You have been asked to locate the computers on a network which the previous consultant has configured with incorrect IPv6 addresses. Which of the following are not correctly formatted IPv6 addresses? (Choose all correct answers.)

fe00: :c955:c944:acdd:3fcb
fe00: :b491:cf79:p493:23ff
2001: 0:44ef68:23eb:99fe:72bec6:ea5f
2001: 0:49e6:39ff:8cf5:6812:ef56

A

fe00: :b491:cf79:p493:23ff
2001: 0:44ef68:23eb:99fe:72bec6:ea5f
2001: 0:49e6:39ff:8cf5:6812:ef56

Option B contains a nonhexadecimal digit. Option C contains blocks larger than 16 bits. Option D contains only seven 16-bit blocks (and no double colon) instead of the eight required for a 128 bit IPv6 address. The address fe00::c955:c944:acdd:3fcb in Option A is correctly formatted for IPv6, with the double colon replacing three blocks of zeroes. Uncompressed, the address would appear as follows: fe00:0000:0000:0000:c955: c944:acdd:3fcb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

During a security evaluation by an outside contractor, you are asked whether your company uses a “fail open” or “fail closed” policy for the datacenter. You don’t know what the contractor means. Which of the following physical security mechanisms can either “fail close” or “fail open”?

Door locks

Motion detectors

Honeypots

A

Door locks

The terms fail close and fail open refer to the default position of an electric or electronic door lock when there is a power failure. Security is often a trade-off with safety, and in the event that an emergency occurs that results in a power outage, whether secured doors are permanently locked or left permanently open is a critical factor. The terms fail close and fail open do not apply to motion detectors or video cameras. A honeypot is a computer configured to lure potential attackers; it is not a physical security mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Your company is concerned about the possibility of insider threats. Which of the following security measures can you use to monitor the specific activities of authorized individuals within sensitive areas?

Identification badges

Motion detection

Video surveillance

A

Video surveillance

Video surveillance can monitor the activities of all users in a sensitive area, authorized or not. With properly placed equipment, even specific actions, such as commands typed into a computer, can be monitored. Identification badges, key fobs, and motion detection can indicate the presence of individuals in a sensitive area, but they cannot monitor specific activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the public key infrastructure (PKI), users and computers are issued a key pair. Which half of a cryptographic key pair is never transmitted over the network?

The session key

The public key

The private key

A

The private key

In a PKI, the two halves of a cryptographic key pair are the public key and the private key. The public key is freely available to anyone, but the private key is never transmitted over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following are not examples of multifactor authentication? (Choose all correct answers.)

A system that requires a smart card and a PIN for authentication

A system that uses an external RADIUS server for authentication

A system that requires two passwords for authentication

A system that requires a password and a retinal scan for authentication

A

A system that uses an external RADIUS server for authentication

A system that requires two passwords for authentication

Multifactor authentication combines two or more authentication methods, and reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. A password and a retinal scan is an example of a multifactor authentication system. A smartcard and a PIN, which is the equivalent of a password, is an example of multifactor authentication because it requires users to supply something they know and something they have. Multifactor authentication refers to the proofs of identity a system requires, not the number of servers used to implement the system. Therefore the use of a RADIUS server does not make for an example of multifactor authentication. A system that requires two passwords is not an example of multifactor authentication, because an attacker can compromise one password as easily as two. A multifactor authentication system requires two different forms of authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements best describes symmetric key encryption?

A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data

A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data

A cryptographic security mechanism that uses the same key for both encryption and decryption

A

A cryptographic security mechanism that uses the same key for both encryption and decryption

Symmetric key encryption uses only one key both to encrypt and decrypt data. Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. Security mechanisms that use multiple key sets are not defined as symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements about single-mode fiber-optic cable are true?

Multimode cables use an LED light source, while single-mode cables use a laser.

Multimode cables can span longer distances than single-mode cables.

Multimode cables have a smaller core filament than single-mode cables.

Multimode cables have a smaller bend radius than single-mode, making them easier to install.

Multimode fiber-optic cables require a ground, whereas single-mode cables do not.

A

Multimode cables use an LED light source, while single-mode cables use a laser.

Multimode cables have a smaller bend radius than single-mode, making them easier to install.

Multimode cables use an LED light source and have a smaller bend radius than single-mode cables. Single-mode cables have a smaller core filament and can span longer distances than multimode cables. Fiber-optic cables are not conductors of electricity, so none of them require a ground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A user swipes a smartcard through the reader connected to a laptop and then types a password to log on to the system. Which of the following actions is the user performing?

Accounting

Authorization

Authentication

A

Authentication

Authentication is the process of confirming a user’s identity. Smartcards and passwords are two of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following cabling topologies have never been used by standard Ethernet networks? (Choose all correct answers.)

Bus

Ring

Star

Mesh

A

Ring

Mesh

Ethernet has never used a ring or mesh topology. The first Ethernet networks used a physical layer implementation commonly known as Thick Ethernet or 10Base5. The network used coaxial cable in a bus topology. Later Ethernet standards use twisted pair or fiber-optic cables in a star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pulling into your company parking lot at lunch time, you notice a person without a company parking sticker on his car working at a laptop. You’ve seen this more than once, and you begin to suspect that unauthorized users are connecting to the company’s wireless access point and gaining access to the network. Which of the following are steps you can take to prevent this from happening in the future? (Choose all correct answers.)

Use Kerberos for authentication

Place the access point in a DMZ

Disable SSID broadcasting

Implement MAC address filtering

A

Disable SSID broadcasting

Implement MAC address filtering

Disabling SSID broadcasting prevents a wireless network from appearing to clients. The clients must specify the SSID to which they want to connect. MAC address filtering is a form of access control list (ACL) that is maintained in the access point and that contains the addresses of devices that are to be permitted to access the network. Both of these mechanisms make it more difficult for unauthorized devices to connect to the access point. The other two options will not help to prevent unauthorized access. Kerberos is an authentication protocol used by Active Directory, and relocating the access point to a DMZ will not resolve the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Traffic shaping is a series of techniques that optimize the allocation of network bandwidth. Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all correct answers.)

Broadcast storming

Bandwidth throttling

Network address translation

Rate limiting

A

Bandwidth throttling

Rate limiting

Bandwidth throttling is a traffic shaping technique that prevents specified data streams from transmitting too many packets. Rate limiting is a traffic shaping technique that controls the transmission rate of sending systems. A broadcast storm is a type of network switching loop. Network address translation is a method by which private networks can share registered IP addresses. Neither of these last two is a traffic shaping technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiprotocol switches are devices that perform functions associated with two different layers of the Open Systems Interconnection (OSI) model. Which two of the following layers are often associated with network switching. (Choose all correct answers.)

Application

Presentation

Session

Transport

Network

Data link

Physical

A

Network

Data link

The primary function of a network switch is to process packets based on their media access control (MAC) addresses, which makes it a data link layer device. However, multiprotocol switches are devices that can also perform routing functions based on IP addresses, which operate at the network layer. Switches are not typically associated with the other layers of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You are attempting to connect your new laptop to your company’s wireless network. The wireless access point on the network has an SSID that is not broadcasted and uses WPA2 for security. Which of the following describes what you must do to connect your laptop to the network?

Select the SSID from a list and allow the client to automatically detect the security protocol.

Type the SSID manually and then select WPA2 from the security protocol options provided.

Type the SSID manually and allow the client to automatically detect the security protocol.

A

Type the SSID manually and then select WPA2 from the security protocol options provided.

An SSID that is not being broadcasted is not detectable by clients, so you must type it in manually. Security protocols are also not detectable, so you must select the WPA2 protocol from the list of options provided on the laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a media access control mechanism designed to prevent two systems using the same network medium from transmitting at the same time. Which of the following IEEE standards calls for the use of CSMA/CA?

  1. 3
  2. 1X
  3. 11ac
A

802.11ac

The IEEE 802.11ac standard, like all of the wireless LAN standards in the 802.11 working group, uses CSMA/CA for media access control. The 802.1X standard defines an authentication mechanism and does not require a media access control mechanism. The IEEE 802.3 (Ethernet) standard uses a different mechanism for media access control: Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A large enterprise network will—at a minimum—have demarcation points for telephone services and a connection to an Internet service provider’s network. In many cases, these services will enter the building in the same equipment room that houses the backbone switch. Which of the following is the term used to describe this wiring nexus?

IDF

RDP

MDF

A

MDF

The place containing the demarcation points and the backbone switch is called the main distribution frame (MDF). An intermediate distribution frame (IDF) is the location of localized telecommunications equipment such as the interface between the horizontal cabling and the backbone. Mean Time Between Failures (MTBF) and Remote Desktop Protocol (RDP) are not network wiring locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have configured your company’s wireless network to enable clients to authenticate only when the signal strength of their connections exceeds a specified level. Which of the following terms best describes the security mechanism provided by this configuration?

Geofencing

Local authentication

Motion detection

A

Geofencing

Geofencing is the generic term for a technology that limits access to a network or other resource based on the client’s location. In wireless networking, geofencing is intended to prevent unauthorized clients outside the facility from connecting to the network. By allowing only users with strong signals to connect, you help to prevent access to outside users. Local authentication is an application or service that triggers an authentication request to which the user must respond before access is granted. Port security is a method for protecting access to switch ports. Motion detection is a system designed to trigger a notification or alarm when an individual trespasses in a protected area. None of these other options are related to signal strength

17
Q

Social engineering has become an increasingly serious problem on your company network. Which of the following is an effective method for preventing sensitive data from being compromised through social engineering?

Install a firewall between the internal network and the Internet.

Install an antivirus software product on all user workstations.

Implement a program of user education and corporate policies.

A

Implement a program of user education and corporate policies.

Social engineering is the practice of obtaining sensitive data by contacting users and pretending to be someone with a legitimate need for that data. No software or hardware solution can prevent it; the only way is to educate users of the potential dangers and establish policies that inform users what to do when they experience a social engineering attempt. Social engineering is not a virus or other form of malware, so an antivirus product has no effect against it. Social engineering is not implemented in network traffic, so a firewall cannot filter it. Social engineering is not implemented in network traffic, so IPsec cannot protect against it

18
Q

You have been given a Class B network IP address with which to configure the new network you are designing. Which of the following is the default subnet mask you should use for an IPv4 Class B network?

  1. 255.255.255
  2. 255.255.0
  3. 255.0.0
A

255.255.0.0

A Class B address uses the first two octets as the network identifier, which yields a binary subnet mask of 11111111 11111111 00000000 00000000. In decimal form, the subnet mask is 255.255.0.0. The 255.0.0.0 mask is for Class A addresses, and the 255.255.255.0 mask is for Class C addresses. 255.255.255.255 is the broadcast address for the current network

19
Q

DSL (Digital Subscriber Line) is a family of wide area networking technologies based on the Public Switched Telephone Network (PSTN) that provides higher data rates by using frequency ranges that are higher than the standard voice spectrum. Which of the following DSL technologies can adjust its transmission speed based on line conditions?

VDSL

HDSL

RADSL

A

RADSL

Rate-Adaptive Digital Subscriber Line (RADSL) technology can adjust its rate of transmission based on line conditions. High-bit-rate Digital Subscriber Line (HDSL), Very high-rate Digital Subscriber Line (VDSL), and Internet Digital Subscriber Line (IDSL) do not use rate adaptive transmission

20
Q

You have just installed a web server for your company, which is configured to host a public Internet site using the registered domain name adatum.com. The server’s hostname in the Domain Name System (DNS) is www. The web server also has an administrative site, which you want to be able to access remotely. You have configured the administrative site to be encrypted and to use the port number 12354. Which of the following URLs must you use to access the administrative website from the Internet?

https: //www.adatum.com:12354
http: //www.adatum.com
https: //www.adatum.com:80
http: //www.adatum.com:12354

A

https://www.adatum.com:12354

Because the administrative site is encrypted, you must use the HTTPS:// prefix to access it. Because the administrative site uses the nondefault port number 12354, you must append that number to the server name after a colon

21
Q

To prevent outside users from accessing your wireless network, you configure the access point not to broadcast the network’s SSID. However, you later discover that outsiders are still accessing the network. For which of the following reasons is disabling SSID broadcasts a relatively weak method of device hardening?

Attackers can capture packets transmitted over the network and read the SSID from them.

Every access point’s SSID is printed on a label on the back of the device.

Attackers have software that can easily guess a network’s SSID

A

Attackers can capture packets transmitted over the network and read the SSID from them.

Disabling SSID broadcasts is a way of hiding the presence of a wireless network, but if an intruder knows that a network is there, it is a simple matter to capture packets transmitted by the wireless devices and read the SSID from them. The other options do not explain the weakness of suppressing SSID broadcasts. It is not possible to connect to a wireless network without the SSID. SSIDs are set by the administrator of the access point; they are not printed on the device’s label. SSIDs can be found relatively easily, but guessing them is no easier than guessing a password

22
Q

You are installing a web server farm in your corporate headquarters, which will be used to host websites for the corporation’s subsidiaries, located all around the world. In which of the following cloud models does a single organization function as both the provider and the consumer of all cloud services?

Private cloud

Public cloud

Ad hoc cloud

A

Private cloud

In a private cloud, the same organization that uses the cloud services is also the sole owner of the infrastructure that provides those services. In the public cloud model, one organization functions as the provider, and another organization consumes the services of the provider. A hybrid cloud is a combination of public and private infrastructure so that the consumer organization is only a partial owner of the infrastructure. There is no such thing as an ad hoc cloud model

23
Q

Your supervisor has recently begun using the terms on-boarding and off-boarding, with which you are unfamiliar. With which of the following types of policies are these terms typically associated?

Incident response

Identity management

Inventory management

A

Identity management

On-boarding and off-boarding are identity management processes in which users are added or removed from an organization’s identity and access management (IAM) system. This grants new users the privileges they need to use the network, modifies their privileges if they change positions, and revokes privileges when they leave the company. On-boarding and off-boarding are not data loss prevention, incident response, or inventory management processes