Technologies and Tools (2) Flashcards
You are concerned about an attacker enumerating all of your network. What protocol might help at least mitigate this issue?
HTTPS
IPSec
LDAPS
LDAPS
Lightweight Directory Access Protocol Secure (LDAPS) would at least mitigate the risk. LDAP is a directory of the network (computers, users, etc.). Securing that would help mitigate network enumeration
You have been asked to implement a secure protocol for transferring files that uses digital certificates. Which protocol would be the best choice?
FTP
SFTP
FTPS
FTPS
FTPS is File Transfer Protocol with SSL/TLS and uses digital certificates to secure file transfer
Ahmed is responsible for VoIP at his company. He has been directed to ensure that all VoIP calls have the option to be encrypted. What protocol is best suited for security VoIP calls?
SIP
TLS
SRTP
SRTP
Secure Real-Time Transport Protocol (SRTP) is used to encrypt and secure RTP. RTP is the protocol for transmitting VoIP
What is the purpose of screen locks on mobile devices?
To encrypt the device
To limit access to the device
To load a specific user’s apps
To limit access to the device
A screen lock limits access to users who know the code
Maria is a security engineer with a large bank. Her CIO has asked her to investigate the use of context-aware authentication for online banking. Which of the following best describes context-aware authentication?
In addition to username and password, authentication is based on the entire context (location, time of day, action being attempted, etc.).
Without a username or password, authentication is based on the entire context (location, time of day, action being attempted, etc.).
Authentication that requires a username and password, but in the context of a token or digital certificate
In addition to username and password, authentication is based on the entire context (location, time of day, action being attempted, etc.).
Context-aware authentication does still require a username and password, but in addition to those criteria, it examines the user’s location, time of day they are logging in, computer they are logging in from, what they are trying to do, and so forth
What does application management accomplish for mobile devices?
Only allows applications from the iTunes store to be installed
Ensures the company has a list of all applications on the devices
Ensures only approved applications are installed on the devices
Ensures only approved applications are installed on the devices
Application management is primarily concerned with ensuring only authorized and approved applications are installed on mobile devices
Dominick is responsible for security at a medium-sized insurance company. He is very concerned about detecting intrusions. The IDS he has purchased states that he must have an IDS on each network segment. What type of IDS is this?
IPS
Passive
Inline
Inline
An inline IDS is actually in the traffic line (i.e., on the network segment where traffic is)
Remote employees at your company frequently need to connect to both the secure company network via VPN and open public websites, simultaneously. What technology would best support this?
Split tunnel
IPSec
Full tunnel
Split tunnel
Split tunneling allows a mobile user to access dissimilar security domains like a public network (e.g., the Internet) and a local LAN or WAN at the same time
Denish is looking for a solution that will allow his network to retrieve information from a wide range of web resources, while all traffic passes through a proxy. What would be the best solution?
Forward proxy
Reverse proxy
SPI
Forward proxy
A forward proxy is a single location that provides access to a wide range of web sources
Someone has been rummaging through your company’s trash bins seeking to find documents, diagrams, or other sensitive information that has been thrown out. What is this called?
Dumpster diving
Trash diving
Social engineering
Dumpster diving
This is the term for rummaging through the waste/trash
Derrick is responsible for a web server cluster at his company. The cluster uses various load-balancing protocols. Derrick wants to ensure that clients connecting from Europe are directed to a specific server in the cluster. What would be the best solution to his problem?
Affinity
Binding
Load balancing
Affinity
Affinity load balancing ties certain users or groups of users to a specific server so they will be routed to that server if possible
Teresa is responsible for WiFi security in her company. Her main concern is that there are many other offices in the building her company occupies and that someone could easily attempt to breach their WiFi from one of these locations. What technique would be best in alleviating her concern?
Using thin WAPs
Geofencing
WAP placement
WAP placement
Placing the WAPs carefully so as to provide the best coverage for the company, with minimum overlap outside the company, will be the best way to keep those in adjacent offices from attempting to breach the WiFi. When placing WAPs for the best coverage, one needs to focus on signal strength to ensure there is no gaps between WPAs
Juan is responsible for the SIEM in his company. The SIEM aggregates logs from 12 servers. In the event that a breach is discovered, which of the following would be Juan’s most important concern?
Event duplication
Impact assessment
Correlation
Correlation
Correlating the events from the servers related to the breach would be the most important issue to address for the SIEM manager
When you are considering an NIDS or NIPS, what are your two most important concerns?
Cost and false positives
False positives and false negatives
Power consumption and cost
False positives and false negatives
The total number of erroneous reports (i.e., false positives and false negatives) is the biggest concern because this determines effectiveness of the system
Shelly is very concerned about unauthorized users connecting to the company routers. She would like to prevent spoofing. What is the most essential antispoofing technique for routers?
ACL
Logon
NIPS
ACL
Access control lists are Cisco’s primary recommendation to prevent spoofing on routers. ACLs limit access to the router and its functionality