Technologies and Tools (1) Flashcards
John is looking for a new firewall for a small company. He is concerned about DoS attacks, particularly the SYN flood. Which type of firewall would give the best protection against the SYN flood?
Packet filter
Bastion
SPI
SPI
The correct answer is stateful packet inspection (SPI). SPI looks at the entire context of the conversation and will stop SYN floods
You are responsible for network security at an insurance company. A lot of employees bring their own devices. You have security concerns about this. You have decided to implement a process whereby when users connect to your network, their devices are scanned. If a device does not meet your minimum security requirements, it is not allowed to connect. What best describes this?
NAC
SPI
IDS
NAC
The correct answer is NAC, or Network Access Control. NAC is a network management solution that defines and implements a policy that enables only compliant and trusted endpoint devices to access network resources
Ahmed is responsible for VPN connections at his company. His company uses IPSec exclusively. He has decided to implement IPSec in a mode that encrypts the data of only the packet, not the headers. What is this called?
Tunneling
IKE
Transport
Transport
Transport mode is the mode wherein IPSec encrypts the data, but not the packet header
Maria is responsible for monitoring IDS activity on her company’s network. Twice in the past month there has been activity reported on the IDS that investigation has shown was legitimate traffic. What best describes this?
False negative
Passive
False positive
False positive
When an IDS (or any security device) labels legitimate traffic as an attack, that is called a false positive
Juanita is a network administrator for a large university. The university has numerous systems, each with logs she must monitor and analyze. What would be the best approach for her to view and analyze logs from a central server?
NAC
IDS
SIEM
SIEM
Security Information and Event Management (SIEM) systems are designed specifically for log aggregation and analysis
Enrique is responsible for web application security at his company. He is concerned about attacks such as SQL injection. Which of the following devices would provide the best protection for web attacks on his web application server?
ACL
SPI
WAF
WAF
A web application firewall (WAF) is designed to provide firewall protection that also will protect against specific web attacks
ACME Company has several remote offices. The CIO wants to set up permanent secure connections between the remote offices and the central office. What would be the best solution for this?
L2TP VPN
IPSEC VPN
Site-to-site VPN
Site-to-site VPN
A site-to-site VPN is a permanent VPN connection between sites. Connecting remote offices is a typical site-to-site VPN implementation
Mary is responsible for network security at a medium-sized insurance company. She is concerned that the offices are too open to public traffic and someone could simply connect a laptop to an open RJ45 jack and access the network. Which of the following would best address this concern?
ACL
VLAN
Port security
Port security
By mapping network jacks to specific MAC addresses of machines, you can prevent a rogue machine from being connected
You are the network administrator for an e-commerce company. You are responsible for the web server cluster. You are concerned about not only failover, but also load-balancing and using all the servers in your cluster to accomplish load-balancing. What should you implement?
Active-active
Active-passive
Affinity
Active-active
An active-active cluster has all servers working, rather than keeping a duplicate server in reserve
Donald is working as a network administrator. He is responsible for the database cluster. Connections are load-balanced in the cluster by each new connection being simply sent to the next server in the cluster. What type of load-balancing is this?
Round-robin
Affinity
Weighted
Round-robin
Round-robin load balancing simply sends each new connection to the next server in the cluster
Gerald is setting up new wireless access points throughout his company’s building. The wireless access points have just the radio transceiver, with no additional functionality. What best describes these wireless access points?
Fat
Thick
Thin
Thin
The term for this is thin wireless access point
Mohaned is an IT manager for a hotel. His hotel wants to put wireless access points on each floor. The specifications state that the wireless access points should have minimal functionality, with all the configuration, authentication, and other functionality centrally controlled. What type of wireless access points should Mohaned consider purchasing?
Fat
Controller-based
Stand-alone
Controller-based
Controller-based wireless access points have minimal functionality, with most functions centrally controlled
What IPSec protocol provides authentication and encryption?
AH
ESP
IKE
ESP
Encapsulating Security Payload provides both integrity and encryption
Terrance is implementing IPSec. He wants to ensure that the packets are encrypted, and that the packet and all headers are authenticated. What should he implement?
AH
ESP
AH and ESP
AH and ESP
ESP provides encryption and AH provides complete authentication, including the header, so both are needed to meet the requirements
You are responsible for security at your company. One of management’s biggest concerns is that employees might exfiltrate sensitive data. Which of the following would you implement first?
Routine audits of user machines
VLAN
USB blocking
USB blocking
USB blocking will prevent anyone from plugging in a USB and taking out data