Practice Test 8 Flashcards

1
Q

Which functionality allows a DLP system to fulfill its role?

Motion detection
Environmental monitoring
Content inspection
Loop protection

A

Content inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refer(s) to security solution(s) that can be implemented as a function of a DLP system? (Select all that apply)

USB blocking
Virtualization
Email monitoring
Directory services
Cloud-based security
A

USB blocking
Email monitoring
Cloud-based security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of computer security solution that allows to define and enforce network access policies is known as:

NAC
NIDS
NFC
NAT

A

NAC

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refer to the implementations of NAC? (Select 2 answers)

IPsec
MAC filter
BYOD
802.1X
HIDS/HIPS
A

MAC filter

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company’s security policy requires all employee devices to have a software installed that would run as a background service on each device and perform host security health checks before granting/denying it access to the corporate intranet. Based on the given description, which of the answers listed below can be used to describe the software’s features? (Select 2 answers)

Agentless
Dissolvable
Agent-based
Permanent

A

Agent-based

Permanent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of security measures can be implemented on an MX gateway? (Select all that apply)

Encryption
Security guards
DLP
Motion detection
Spam filter
A

Encryption
DLP
Spam filter

Data loss prevention(DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of device would be the most convenient for interconnecting two or more physically separated network segments?

Wireless bridge
Layer 3 switch
Wireless Access Point (WAP)
Cable modem

A

Wireless bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSL/TLS accelerators are used to decode secure communication links for the purpose of content inspection.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An SSL decryptor card is a type of dedicated hardware device that improves performance of a server by taking over computational tasks related to handling of encrypted network traffic.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of device that translates data between different communication formats is called:

Multilayer switch
Media gateway
Protocol analyzer
Media converter

A

Media gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to a piece of hardware and associated software/firmware designed to provide cryptographic functions?

HSM
EFS
STP
WAF

A

HSM

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software tool used for capturing and examining contents of the network traffic is known as:

Port scanner
Honeypot
Protocol analyzer
Vulnerability scanner

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a GUI packet sniffer?

pfSense
Nmap
tcpdump
Wireshark

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a CLI packet sniffer?

Nmap
tcpdump
OpenVAS
Wireshark

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Nmap?

Network scanner
Exploitation framework
Protocol analyzer
Password cracker

A

Network scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the tools listed below would be used to detect a rogue AP?

HIDS
Vulnerability scanner
Packet sniffer
Wireless scanner

A

Wireless scanner

17
Q

Which of the following tools would be used to perform a site survey?

pfSense
Wireless scanner
OpenVAS
Nmap

A

Wireless scanner

18
Q

Examples of password cracking software include: (Select 2 answers)

Security Onion
John the Ripper
Cain & Abel
Back Orifice
tcpdump
A

John the Ripper

Cain & Abel

19
Q

Which of the tools listed below offers the functionality of a vulnerability scanner?

Roo
OpenVAS
Wireshark
pfSense

A

OpenVAS

20
Q

Which of the following tools offers the functionality of a configuration compliance scanner?

Zenmap
Roo
Nessus
DBAN

A

Nessus

21
Q

Which of the answers listed below is an example of exploitation framework?

tcpdump
Metasploit
Security Onion
OpenVAS

A

Metasploit

22
Q

What is the name of a Linux distribution commonly used as a target system for practicing penetration testing techniques?

Kali Linux
Debian
Metasploitable
Red Hat
SELinux (Your answer)
A

Metasploitable

23
Q

Which of the terms listed below refers to a method for permanent and irreversible removal of data stored on a memory device?

Sanitization
High-level formatting
Recycle Bin (MS Windows)
Partitioning

A

Sanitization

24
Q

What is the purpose of steganography?

Checking data integrity
Calculating hash values
Hiding data within another piece of data
Data encryption

A

Hiding data within another piece of data

25
Q

A monitored host containing no valuable data specifically designed to detect unauthorized access attempts is known as:

UTM appliance
Trojan horse
Captive portal
Honeypot

A

Honeypot