Security+ Practice Test 6 Flashcards

1
Q

Which of the answers listed below illustrates the difference between passive and active security breach response?

A

IDS vs. IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?

A

NIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the actions listed below can be taken by an IDS?

A

Logging

Sending an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IDS that detects intrusions by comparing network traffic against the previously established baseline can be classified as:

A

Heuristic
Anomaly-based
Behavioral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A security administrator configured an IDS to receive traffic from a network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the IDS?

A

Passive

Out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

A

False positive error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Routers operate at:

A

Layer 3 of the OSI model

Network layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers applies to a Rule-Based Access Control (RBAC) mechanism implemented on routers, switches, and firewalls?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of network traffic filtering criteria can be set on a router?

A
Filtering by IP address
Filtering by network protocol
Filtering by subnet
Filtering by logical port number
=>All of the above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A properly configured antispoofing mechanism on a router should block Internet traffic from IP addresses in the range of:

A

10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
=>All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a data link layer (layer 2) device designed to forward data packets between Local Area Network (LAN) segments?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

A

IEEE 802.1X

17
Q

The process of securing networking devices should include the practice of disabling unused physical ports.

A

True

18
Q

A network switch equipped with the routing capability is sometimes referred to as a layer 3 switch.

A

True

19
Q

Which of the following protocols provide protection against switching loops?

A

STP

RSTP

20
Q

What is the name of a security mechanism that protects a network switch against populating its MAC table with invalid source addresses?

A

Flood guard

21
Q

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A

Proxy

22
Q

Which of the following statements describe the function of a forward proxy?

A

Acts on behalf of a client

Hides the identity of a client

23
Q

Which of the statements listed below describe the function of a reverse proxy?

A

Hides the identity of a server

Acts on behalf of a server

24
Q

What are the characteristic features of a transparent proxy?

A

Doesn’t require client-side configuration
Redirects client’s requests and responses without modifying them
Clients might be unaware of the proxy service

25
Q

A nontransparent proxy:

A

Modifies client’s requests and responses

Requires client-side configuration