Practice Test 8 Flashcards
Which functionality allows a DLP system to fulfill its role?
Motion detection
Environmental monitoring
Content inspection
Loop protection
Content inspection
Which of the answers listed below refer(s) to security solution(s) that can be implemented as a function of a DLP system? (Select all that apply)
USB blocking Virtualization Email monitoring Directory services Cloud-based security
USB blocking
Email monitoring
Cloud-based security
A type of computer security solution that allows to define and enforce network access policies is known as:
NAC
NIDS
NFC
NAT
NAC
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
Which of the following answers refer to the implementations of NAC? (Select 2 answers)
IPsec MAC filter BYOD 802.1X HIDS/HIPS
MAC filter
802.1X
A company’s security policy requires all employee devices to have a software installed that would run as a background service on each device and perform host security health checks before granting/denying it access to the corporate intranet. Based on the given description, which of the answers listed below can be used to describe the software’s features? (Select 2 answers)
Agentless
Dissolvable
Agent-based
Permanent
Agent-based
Permanent
What type of security measures can be implemented on an MX gateway? (Select all that apply)
Encryption Security guards DLP Motion detection Spam filter
Encryption
DLP
Spam filter
Data loss prevention(DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
What type of device would be the most convenient for interconnecting two or more physically separated network segments?
Wireless bridge
Layer 3 switch
Wireless Access Point (WAP)
Cable modem
Wireless bridge
SSL/TLS accelerators are used to decode secure communication links for the purpose of content inspection.
True
False
False
An SSL decryptor card is a type of dedicated hardware device that improves performance of a server by taking over computational tasks related to handling of encrypted network traffic.
True
False
False
A type of device that translates data between different communication formats is called:
Multilayer switch
Media gateway
Protocol analyzer
Media converter
Media gateway
Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?
HSM
EFS
STP
WAF
HSM
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
A software tool used for capturing and examining contents of the network traffic is known as:
Port scanner
Honeypot
Protocol analyzer
Vulnerability scanner
Protocol analyzer
Which of the following is a GUI packet sniffer?
pfSense
Nmap
tcpdump
Wireshark
Wireshark
Which of the following is a CLI packet sniffer?
Nmap
tcpdump
OpenVAS
Wireshark
tcpdump
What is Nmap?
Network scanner
Exploitation framework
Protocol analyzer
Password cracker
Network scanner