Practice Test 6 Flashcards

1
Q

Which of the answers listed below illustrates the difference between passive and active security breach response?

HIPS vs. NIPS
UTM vs. Firewall
CSMA/CD vs. CSMA/CA
IDS vs. IPS

A

IDS vs. IPS

Intrusion Detection System
vs
Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?

NIPS
HIDS
NIDS
NIST

A

NIPS

Network-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the actions listed below can be taken by an IDS? (Select 2 answers)

Firewall reconfiguration
Closing down connection
Logging
Terminating process
Sending an alert
A

Logging

Sending an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IDS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)

Heuristic
Anomaly-based
Behavioral
Signature-based

A

Heuristic
Anomaly-based
Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security administrator configured an IDS to receive traffic from a network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the IDS? (Select 2 answers)

In-band
Passive
Inline
Out-of-band

A

Passive

Out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

Fault tolerance
False positive error
Quarantine function
False negative error

A

False positive error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

False negative
True positive
False positive
True negative

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:

Hub
Switch
Load balancer
Router

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Routers operate at: (Select 2 answers)

Physical layer of the OSI model
Application layer of the OSI model
Layer 3 of the OSI model
Network layer of the OSI model
Layer 5 of the OSI model
A

Layer 3 of the OSI model

Network layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

CRL
NAT
BCP
ACL

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers applies to a Rule-Based Access Control (RBAC) mechanism implemented on routers, switches, and firewalls?

ACL
CSR
DLP
AUP

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of network traffic filtering criteria can be set on a router?

Filtering by IP address
Filtering by network protocol
Filtering by subnet
Filtering by logical port number
All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A properly configured antispoofing mechanism on a router should block Internet traffic from IP addresses in the range of:

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a data link layer (layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

Router
Hub
Switch
Repeater

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

IEEE 802.1X
IEEE 802.11ac
IEEE 802.1D
IEEE 802.11x

A

IEEE 802.1X

17
Q

The process of securing networking devices should include the practice of disabling unused physical ports.

True
False

A

True

18
Q

A network switch equipped with the routing capability is sometimes referred to as a layer 3 switch.

True
False

A

True

19
Q
Which of the following protocols provide protection against switching loops? (Select 2 answers)
RTP
SRTP
RDP
STP
RSTP
A

STP

RSTP

20
Q

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?

Honeypot
Firewall
Flood guard
Antivirus

A

Flood guard

21
Q

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Bridge
Active hub
Server
Proxy

A

Proxy

22
Q

Which of the following statements describe the function of a forward proxy? (Select 2 answers)

Acts on behalf of a client
Hides the identity of a client
Acts on behalf of a server
Hides the identity of a server

A

Acts on behalf of a client

Hides the identity of a client

23
Q

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers)

Acts on behalf of a client
Hides the identity of a server
Acts on behalf of a server
Hides the identity of a client

A

Hides the identity of a server

Acts on behalf of a server

24
Q

What are the characteristic features of a transparent proxy? (Select all that apply)

Doesn’t require client-side configuration
Modifies client’s requests and responses
Redirects client’s requests and responses without modifying them
Clients might be unaware of the proxy service
Requires client-side configuration

A

Doesn’t require client-side configuration

Redirects client’s requests and responses without modifying them

Clients might be unaware of the proxy service

25
Q

A nontransparent proxy: (Select 2 answers)

Modifies client’s requests and responses
Doesn’t require client-side configuration
Requires client-side configuration
Redirects client’s requests and responses without modifying them

A

Modifies client’s requests and responses

Requires client-side configuration