Practice Questions 97-108 Flashcards

1
Q
You are tasked with configuring a switch so that it separates VoIP and data traffic. Which provides the BEST solution?
A.NAC
B. DMZ
C. SRTP
D. VLAN
A

A virtual local area network (VLAN) provides separation for traffic and can be configured to separate Voice over IP (VoIP) traffic and data traffic .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Your organization host an e-commerece business that has become quiet successful recently. It includes a web farm and a database server within  the DMZ. IT management is concerned that there isn't enough staff working around the clock to protect these servers. Which would provide the BEST automated protection for these servers?
A. NIDS and HIDS
B. NIPS and HIPS
C. SIEM and NIPS 
D. SIEM and NIDS
A

Network-based intrusion prevention system (NIPS) protect the DMZ and Host based intrusion prevention systems (HIPS) on the database server and web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Management is concerned about malicious activity and wants to implement a security control that will detect unusual traffic on the network. Which is the BEST choice to meet this goal?
A Network based firewall
B. Signature-based IDS
C. Anomaly-based IDS
D. Honeynet
A

An anomaly based (behavior based) intrusion detection system (IDS) compares activity with a previously created baseline to detect any anomalies or unusual traffic on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Of the following choices what can you used to divert malicious attacks on your network away from valuable data to worthless fabricated data?
A. IPS
B. Proxy Server
C. Web application firewall
D. Honeypot
A

A honeypot can divert malicious attacks to a harmless area of your network such as away from production servers holding valid data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Your organization frequently has guest visiting in various conference rooms throughout the building. These guests need access to the Internet via wireless network, but should not be able to access internal network resources. Employees need access to both the internal network and the Internet. Which would BEST meet this need?
A. NAT 
B. DMZ
C. VPN
D. 802.1x
A

An 802.1x server provides port-based authentication and can authenticate clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Management asks you if you can modify the wireless network to prevent users from easily discovering it. Which would you modify to meet this goal?
A. CCMP
B. WPA2 Enterprise
C. SSID broadcast 
D. MAC address filter
A

You can disable service set identifier (SSID) broadcasting to prevent users from easily discovering the wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Marge, a security administrator is tasked with ensuring that all devices have updated virus definition files before they can access network resources. Which technology would help accomplish this goal. 
A. NIDS 
B. NAC
C. DLP
D.DMZ
A

Network Access Controls (NAC) inspects clients for health, including having up-to -date virus definition files and can restrict network access to unhealthy clients to a remediation network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Your organization is hosting a wireless network with an 802.1x server using PEAP. On Thursday, users report they can no longer access the wireless network, but they can access it on the previous day. Administrators verified the network configuration matches the baseline, there aren't any hardware outages, and the the wired network is operational. Which is the MOST likely cause for this problem? 
A. The RADIUS server certificate expired
B. DNS is issuing incorrect host names
C. DHCP is issuing duplicate IP adresses
D. MAC filtering is enabled
A

Remote Authentication Dial-User Service (RADIUS) server certificate expired. An 802.1x is implemented as a RADIUS server and Protected Extensible Authentication Protocol (PEAP) requires a certificate which is key clue in the question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Lisa had created an application on her development computer. She wants to test it on a Linux-based computer she commonly uses for testing. However, she wants to ensure it is isolated when she tests it. Which is the BEST solution to meet her needs?
A. Use chroot
B. Sideload the application 
C. Use FDE
D. Use chmod
A

The chroot command isolates the application within a sandbox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your organization recently purchased some laptops that include a TPM. Which BEST identifies what the TPM provides?
A. Detection of unauthorized data transfer
B. A hardware root of trust
C. Sandboxing
D. An external security device used to store cryptographic keys.

A

Trusted Platform Module (TPM) includes an encryption key burned into the chip and this key provides a hardware root of trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Your organization has recently rented access to computing resources via a cloud. Administrators within your organization apply patches to the operating system. Which  choice BEST describes this cloud deployment model?
A. Community 
B. Software as a Service
C. Infrastructure as Service 
D. Hybrid
A

Infrastructure as a Service (IaaS) us a cloud computing option where the vendor provides access to a computer, but customers must manage the system, including keeping it up to date with current patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Homer noticed that several generators within the nuclear power plant have been turning on without awe interaction. Security investigators discovered that an unauthorized file was installed, causing these generators to start at times intervals. Further, they determined this file was installed during a visit by external engineers. What should Homer recommend to migrate this threat in the future?
A. Create an internal CA
B. Implement WPA2 Enterprise
C. Implement patch management processes.
D. Configure the SCADA within a VLAN.

A

The generators are likely controls within the Supervisory control and data acquisition (SCADA) system and isolating them within a virtual local area (VLAN) will protect them from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly