Security Flashcards
Which feature of an NGFW is designed to protect the network against malware infections? NGIPS SPI AVC AMP
AMP (Advanced Malware Protection). Uses set of signatures to verify file transfers and block malware infections before they reach end devices.
Which two devices are deployed inline to actively prevent attacks?
Firewall
IPS
What format other than the default ASCII can be used when configuring a WPA2 PSK in the Cisco Wireless LAN Controller GUI? Base64 Hexadecimal Decimal Binary
Hexadecimal
In a wireless network protected by WPA3, which algorithm is used to check the integrity of a message? SHA GMAC CBC-MAC AES
GMAC (Galois Message Authentication Code) used for Integrity
AES used for encryption
Gratuitous ARP messages can be exploited to make which two kinds of attacks? Eavesdropping Reconnaissance Attack Spoofing Attack DDoS DoS Amplification Attack
Eavesdropping
Spoofing Attack
Which two combinations of authentication methods are considered MFA? PIN and Password PIN and Smart card Fingerprint and retina Password and fingerprint Username and password
PIN and smart card
Password and fingerprint
What is the main security reason behind deprecating the wireless TKIP standard?
Using RC4
RC4 is a legacy cipher that is susceptible to offline and dictionary attacks.
What will be the result of installing an IPS sensor using the promiscuous mode?
The sensor receives a copy of the traffic only.
Promiscuous Mode = Makes IPS into an IDS and only alerts the administrator
In-Line Mode = Allows IPS to analyze traffic and actively block attacks.
A network has experienced a number of MitM attacks. Which three mitigation techniques could be used to secure the network?
Encryption
User Training
DAI
Match an AAA concept with its basic usage.
Authentication
Authorization
Accounting
Authentication: Network access is granted or denied
Authorization: A dedicated VLAN is assigned
Accounting: Sessions are recorded
Which set of commands should be used to enable DHCP snooping on a switch.
ip dhcp snooping
ip dhcp snooping vlan
interface fa/g
ip dhcp snooping trust