Security Fundamentals Flashcards
In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers)
(A) Source IP address
(B) MAC address
(C) ARP address
(D) Routing table
(E) Destination IP address
(F) ARP table
In a spoofing attack, which of the following parameters are commonly spoofed? (Choose two answers)
**(A) Source IP address
(B) MAC address **
(C) ARP address
(D) Routing table
(E) Destination IP address
(F) ARP table
AAA servers usually support the protocol TACACS+ and ____________________ to communicate with enterprise resources.
(A) DHCP
(B) ARP
(C) RADIUS
(D) HTTP
AAA servers usually support the protocol TACACS+ and ____________________ to communicate with enterprise resources.
(A) DHCP
(B) ARP
(C) RADIUS
(D) HTTP
The senior network engineer assigns you a task related to port security. He needs your help to configure the fa0/1 from the SW-examsD to accept frames only from the MAC 0200.1111.2222. Type the commands that need to be configured on the SW-examsD following the requirements below:
1. configure the FastEthernet0/1 to be an access port
2. enable port security on that interface
3. define the allowed MAC address
(A) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/2
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222
(B) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
(C) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.2222.2222
(D) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222
The senior network engineer assigns you a task related to port security. He needs your help to configure the fa0/1 from the SW-examsD to accept frames only from the MAC 0200.1111.2222. Type the commands that need to be configured on the SW-examsD following the requirements below:
1. configure the FastEthernet0/1 to be an access port
2. enable port security on that interface
3. define the allowed MAC address
(A) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/2
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222
(B) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
(C) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.2222.2222
(D) SW-examsD#configure terminal
SW-examsD(config)#interface FastEthernet0/1
SW-examsD(config-if)#switchport mode access
SW-examsD(config-if)#switchport port-security
SW-examsD(config-if)#switchport port-security macaddress 0200.1111.2222
_____________________ attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to additional users.
(A) Spoofing
(B) Phishing
(C) DoS
(D) SQL injection
_____________________ attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to additional users.
(A) Spoofing
(B) Phishing
(C) DoS
(D) SQL injection
A _________________ is malicious software that is hidden and packaged inside other software that looks normal and legitimate.
(A) Worm
(B) Virus
(C) Spyware
(D) Trojan
A _________________ is malicious software that is hidden and packaged inside other software that looks normal and legitimate.
(A) Worm
(B) Virus
(C) Spyware
(D) Trojan
What devices can be used to implement DHCP Snooping? (Choose two answers)
(A) Hub
(B) Layer 2 switches
(C) Routers
(D) Layer 3 switches
(E) Access Points
(F) End users
What devices can be used to implement DHCP Snooping? (Choose two answers)
(A) Hub
(B) Layer 2 switches
(C) Routers
(D) Layer 3 switches
(E) Access Points
(F) End users
Which of the following Cisco Firepower NGIPS’s features provides more insights into and control over the users, applications, devices, threats, and vulnerabilities in your network with real-time visibility?
(A) Security automation
(B) Granular application visibility and control
(C) Contextual awareness
(D) Superior effectiveness
Which of the following Cisco Firepower NGIPS’s features provides more insights into and control over the users, applications, devices, threats, and vulnerabilities in your network with real-time visibility?
(A) Security automation
(B) Granular application visibility and control
(C) Contextual awareness
(D) Superior effectiveness
What can be accomplished with a brute-force attack?
(A) Guess a user’s password
(B) Make a server unavailable
(C) Spoof every possible IP address
(D) Alter a routing table
What can be accomplished with a brute-force attack?
(A) Guess a user’s password
(B) Make a server unavailable
(C) Spoof every possible IP address
(D) Alter a routing table
Social engineering attack is accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
(A) TRUE
(B) FALSE
Social engineering attack is accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
(A) TRUE
(B) FALSE
Which of the following human security vulnerabilities attacks is a type of attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company?
(A) Social engineering
(B) Phishing
(C) Whaling
(D) Pharming
Which of the following human security vulnerabilities attacks is a type of attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company?
(A) Social engineering
(B) Phishing
(C) Whaling
(D) Pharming
Which of the following human security vulnerabilities attacks is the attempt to obtain sensitive information such as passwords and credit card details by disguising oneself as a trustworthy entity?
(A) Social engineering
(B) Phishing
(C) Whaling
(D) Pharming
Which of the following human security vulnerabilities attacks is the attempt to obtain sensitive information such as passwords and credit card details by disguising oneself as a trustworthy entity?
(A) Social engineering
(B) Phishing
(C) Whaling
(D) Pharming
You are responsible to enable DHCP snooping on the SW1. The R1 is a DHCP relay agent that needs to be trusted. SW1 places all the ports on VLAN 8. Which commands will you type in order to configure DHCP snooping on the SW1 based on the diagram below?
(A) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 3 SW1(config)# interface GigabitEthernet1/0/2 SW1(config-if)# ip dhcp snooping trust (B) SW1# configure terminal
SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/1/2 SW1(config-if)# ip dhcp snooping trust (C) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/0/2 SW1(config-if)# ip dhcp snooping trust (D) SW1# configure terminal SW1(config)# ip dhcp snooping SW1(config)# ip dhcp snooping vlan 8 SW1(config)# interface GigabitEthernet1/0/2
Which of the following security features rejects invalid and malicious ARP packets and prevents a class of man-in-the-middle attacks?
(A) DoS
(B) DAI
(C) Packet secure
(D) ARP protect
Which of the following security features rejects invalid and malicious ARP packets and prevents a class of man-in-the-middle attacks?
(A) DoS
(B) DAI
(C) Packet secure
(D) ARP protect
In a reflection attack, the source IP address in
the attack packets is spoofed so that it contains the address of the victim.
(A) TRUE
(B) FALSE
In a reflection attack, the source IP address in
the attack packets is spoofed so that it contains the address of the victim.
**(A) TRUE **
(B) FALSE
Type the command that needs to be configured on a switch to automatically recover from the err-disabled state, when caused by port security.
(A) recovery cause psecure-violation
(B) errdisable recovery psecure-violation
(C) errdisable recovery
(D) errdisable recovery cause psecure-violation
Type the command that needs to be configured on a switch to automatically recover from the err-disabled state, when caused by port security.
(A) recovery cause psecure-violation
(B) errdisable recovery psecure-violation
(C) errdisable recovery
(D) errdisable recovery cause psecure-violation