Practice Test 8 Flashcards
Which functionality allows a DLP system to fulfill its role?
Motion detection
Environmental monitoring
Content inspection
Loop protection
Content inspection
Which of the answers listed below refer(s) to security solution(s) that can be implemented as a function of a DLP system? (Select all that apply)
USB blocking Virtualization Email monitoring Directory services Cloud-based security
USB blocking
Email monitoring
Cloud-based security
A type of computer security solution that allows to define and enforce network access policies is known as:
NAC
NIDS
NFC
NAT
NAC
Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
Which of the following answers refer to the implementations of NAC? (Select 2 answers)
IPsec MAC filter BYOD 802.1X HIDS/HIPS
MAC filter
802.1X
A company’s security policy requires all employee devices to have a software installed that would run as a background service on each device and perform host security health checks before granting/denying it access to the corporate intranet. Based on the given description, which of the answers listed below can be used to describe the software’s features? (Select 2 answers)
Agentless
Dissolvable
Agent-based
Permanent
Agent-based
Permanent
What type of security measures can be implemented on an MX gateway? (Select all that apply)
Encryption Security guards DLP Motion detection Spam filter
Encryption
DLP
Spam filter
Data loss prevention(DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.
What type of device would be the most convenient for interconnecting two or more physically separated network segments?
Wireless bridge
Layer 3 switch
Wireless Access Point (WAP)
Cable modem
Wireless bridge
SSL/TLS accelerators are used to decode secure communication links for the purpose of content inspection.
True
False
False
An SSL decryptor card is a type of dedicated hardware device that improves performance of a server by taking over computational tasks related to handling of encrypted network traffic.
True
False
False
A type of device that translates data between different communication formats is called:
Multilayer switch
Media gateway
Protocol analyzer
Media converter
Media gateway
Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?
HSM
EFS
STP
WAF
HSM
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.
A software tool used for capturing and examining contents of the network traffic is known as:
Port scanner
Honeypot
Protocol analyzer
Vulnerability scanner
Protocol analyzer
Which of the following is a GUI packet sniffer?
pfSense
Nmap
tcpdump
Wireshark
Wireshark
Which of the following is a CLI packet sniffer?
Nmap
tcpdump
OpenVAS
Wireshark
tcpdump
What is Nmap?
Network scanner
Exploitation framework
Protocol analyzer
Password cracker
Network scanner
Which of the tools listed below would be used to detect a rogue AP?
HIDS
Vulnerability scanner
Packet sniffer
Wireless scanner
Wireless scanner
Which of the following tools would be used to perform a site survey?
pfSense
Wireless scanner
OpenVAS
Nmap
Wireless scanner
Examples of password cracking software include: (Select 2 answers)
Security Onion John the Ripper Cain & Abel Back Orifice tcpdump
John the Ripper
Cain & Abel
Which of the tools listed below offers the functionality of a vulnerability scanner?
Roo
OpenVAS
Wireshark
pfSense
OpenVAS
Which of the following tools offers the functionality of a configuration compliance scanner?
Zenmap
Roo
Nessus
DBAN
Nessus
Which of the answers listed below is an example of exploitation framework?
tcpdump
Metasploit
Security Onion
OpenVAS
Metasploit
What is the name of a Linux distribution commonly used as a target system for practicing penetration testing techniques?
Kali Linux Debian Metasploitable Red Hat SELinux (Your answer)
Metasploitable
Which of the terms listed below refers to a method for permanent and irreversible removal of data stored on a memory device?
Sanitization
High-level formatting
Recycle Bin (MS Windows)
Partitioning
Sanitization
What is the purpose of steganography?
Checking data integrity
Calculating hash values
Hiding data within another piece of data
Data encryption
Hiding data within another piece of data
A monitored host containing no valuable data specifically designed to detect unauthorized access attempts is known as:
UTM appliance
Trojan horse
Captive portal
Honeypot
Honeypot