Practice Test (1) Flashcards
You are asked to separate the Sales and Marketing department’s network traffic on a layer 2 device within a LAN. This will reduce broadcast traffic and prevent the departments from seeing each other’s resources. Which of the following types of network design would be the best choice?
MAC
NAT
VLAN
VLAN
A virtual LAN (VLAN) is designed to allow network administrators to segment networks within a LAN. Each network will not be able to see traffic assigned to other systems within other VLANs within the same LAN
You are a network administrator and your company has asked you to perform a survey of the campus for open Wi-Fi access points. You walk around with your smartphone looking for unsecured access points that you can connect to without a password. What type of penetration testing concept is this called?
Escalation of privilege
Active reconnaissance
Passive reconnaissance
Passive reconnaissance
Passive reconnaissance is an attempt to obtain information about a computer system and networks without actively engaging with the system
Which of the following is a certificate-based authentication that allows individuals access to U.S. federal resources and facilities?
Proximity card
TOTP
PIV card
PIV card
A personal identity verification (PIV) card contains the necessary data for the cardholder to be allowed to enter federal facilities
You attempt to log into your company’s network with a laptop. The laptop is quarantined to a restricted VLAN until the laptop’s virus definitions are updated. Which of the following best describes this network component?
NAT
DMZ
NAC
NAC
A Network Access Control (NAC) enforces security policies and manages access to a network. It enables compliant, authenticated, and trusted devices to enter the network and access resources. If the device isn’t compliant, it will either be denied access or have limited access until the device becomes compliant
You have been asked to implement a security control that will limit tailgating in high-secured areas. Which of the following security control would you choose?
Mantrap
Faraday cage
Airgap
Mantrap
A mantrap is a physical security access control that contains two sets of doors. When the first set of doors is closed, the second set opens. This access control prevents unauthorized access to a secure area
Your company’s network administrator is placing an Internet web server in an isolated area of the company’s network for security purposes. Which of the following architecture concepts is the network administrator implementing?
Honeynet
DMZ
Proxy
DMZ
A dematerialized zone (DMZ) separates the local area network (LAN) from untrusted networks such as the Internet. Resources that are placed in the DMZ are accessible from the Internet and protect resources located in the LAN
Your company is offering a new product on its website. You are asked to ensure availability of the web server when it receives a large number of requests. Which of the following would be the best option to fulfill this request?
VPN concentrator
SIEM
Load balancer
Load balancer
A load-balancer will distribute and manage network traffic across several servers to increase performance
You are a security administrator for a manufacturing company that produces compounded medications. To ensure individuals are not accessing sensitive areas where the medications are created, you want to implement a physical security control. Which of the following would be the best option?
Security guard
Signs
Faraday cage
Security guard
A security guard is a major role in all layers of security. A guard can execute many functions such as patrolling checkpoints, overseeing electronic access control, replying to alarms, and examining video surveillance
An attacker exploited a bug, unknown to the developer, to gain access to a database server. Which of the following best describes this type of attack?
Zero-day
Cross-site scripting
ARP poisoning
Zero-day
A zero-day attack takes advantage of a security vulnerability on the same day the vulnerability becomes known. Attackers may find vulnerabilities before the company discovers it
A new employee added network drops to a new section of the company’s building. The cables were placed across several fluorescent lights. When users attempted to connect to the data center on the network, they experienced intermittent connectivity. Which of the following environmental controls was the most likely cause of this issue?
DMZ
EMI
BIOS
EMI
Electromagnetic interference (EMI) will disrupt the operation of an electronic device when it is in the area of an electromagnetic field
What method should you choose to authenticate a remote workstation before it gains access to a local LAN?
Router
Proxy server
VPN concentrator
VPN concentrator
A VPN concentrator is a device that creates a remote access or site-to-site VPN connection. A VPN concentrator is used when a company has a large number of VPN tunnels
Which of the following allows a company to store a cryptographic key with a trusted third party and release it only to the sender or receiver with proper authorization?
CRL
Key escrow
Trust model
Key escrow
A key escrow is a location in where keys can be gained by authorized users to decrypt encrypted data
Your company recently upgraded the HVAC system for its server room. Which of the following security implications would the company be most concerned about?
Confidentiality
Availability
Integrity
Availability
Availability would be the biggest concern because the computers would not operate properly if the HVAC system does not work properly. Should the HVAC system not cool the server room adequately, the computers would not operate and become unavailable to their users
Your company provides secure wireless Internet access to visitors and vendors working onsite. Some of the vendors are reporting they are unable to view the wireless network. Which of the following best describes the issue?
MAC filtering is enabled on the WAP.
The SSID broadcast is disabled.
The wrong antenna type is being used.
The SSID broadcast is disabled.
The correct answer is that the SSID broadcast is disabled. Disabling the SSID, the user must enter the SSID to attempt to connect the wireless access point
Your company’s sales team is working late at the end of the month to ensure all sales are reported for the month. The sales members notice they cannot save or print reports after regular hours. Which of the following general concepts is preventing the sales members from performing their job?
Job rotation
Time-of-day restrictions
Least privilege
Time-of-day restrictions
Time-of-day restrictions are a form of logical access control where specific applications or systems are restricted access outside of specific hours
Which of the following symmetric algorithms are block ciphers? (Choose three.)
3DES
ECDHE
RSA
RC4
SHA
Twofish
3DES
RC4
Twofish
3DES, RC4, and Twofish are known as symmetric algorithms. They use the same key to encrypt and decrypt data
A security officer has asked you to use a password cracking tool on the company’s computers. Which of the following best describes what the security officer is trying to accomplish?
Looking for strong passwords
Enforcing a password complexity policy
Looking for weak passwords
Looking for weak passwords
The correct answer is looking for weak passwords. A password-cracking tool can potentially discover users who are currently using weak passwords
Which of the following test gives testers comprehensive network design information?
White box
Black box
Gray box
White box
White-box testing refers to the process of testing a network with all information known about the network or layout
You are the network administrator for your company and want to implement a wireless network and prevent unauthorized access. Which of the following would be the best option?
RADIUS
TACACS+
Kerberos
RADIUS
Remote Authentication Dial-In User Service (RADIUS) enables remote access servers to communicate with a central server. This central server is used to authenticate and authorize users to access network services and resources
Why is input validation important to secure coding techniques? (Choose two.)
It mitigates shoulder surfing.
It mitigates buffer overflow attacks.
It mitigates ARP poisoning.
It mitigates XSS vulnerabilities.
It mitigates buffer overflow attacks.
It mitigates XSS vulnerabilities.
The correct answers are mitigating buffer overflow attacks and cross-site scripts (XSS) vulnerabilities. A buffer overflow attack occurs when a program attempts to place more data in a buffer (memory) than it can hold. This action can corrupt data, crash the program, or execute malicious code. XSS vulnerabilities are found in web applications and are executed by injecting malicious code to gather users’ information