Understanding Basic Network Security Flashcards
Which of the following protocols is a file transfer protocol using SSH? A. SFTP B. TFTP C. SICMP D. CCMP
A. Secure FTP (SFTP) is a secure implementation of FTP, an extension of Secure Shell (SSH), and transmits data using port 22. Trivial FTP is a form of FTP using UDP to transmit smaller amounts of data than FTP. ICMP is a diagnostic protocol used by tools such as ping, but there is no such thing as SICMP. CCMP is an encryption protocol used with wireless networks.
Of the following choices, which one provides the most security for FTP? A. FTP active mode B. FTPS C. TFTP D. SCP
B. File Transfer Protocol Secure (FTPS) uses SSL to secure FTP transmissions. FTP can work in active or passive mode, but this only affects how the ports are used, not the security. TFTP is a trivial form of FTP and doesn’t provide security. SCP uses SSH to copy files over a network and isn’t related to FTP.
Of the following choices, what is a benefit of IPsec? A. MAC filtering B. Flood guard C. Load balancing D. Payload encryption
D. Internet Protocol security (IPsec) includes Encapsulating Security Payload (ESP), which can encrypt the IP packet payload. Port security and network access control can use MAC filtering. A flood guard protects against SYN flood attacks, and a load balancer can optimize and distribute data loads across multiple computers, but neither are related to IPsec.
What protocol is used to monitor and configure network devices? A. ICMP B. SFTP C. SNMP D. DNS
C. Simple Network Management Protocol (SNMP) can monitor and manage network devices such as routers or switches and uses device traps. Diagnostic tools such as ping use ICMP, and many firewalls block ICMP traffic. SFTP is a secure form of FTP used to upload and download files. DNS resolves host names to IP addresses.
Which of the following is an IPv6 address? A. 192.168.1.100
B. 192.168.1.100/ 128
C. FE80: 20D4: 3FF7: 003F:DE62
D. FE80: 0000: 0000: 0000: 20D4: 3FF7: 003F:DE62
D. An IPv6 address uses 128-bit IP addresses and includes eight groups of four hexadecimal characters. IPv4 (not IPv6) uses the dotted decimal format with decimals separated by dots. A double colon indicates zero compression, when less than eight groups are shown, but if omitted the address isn’t valid.
Which of the following IP addresses are on the same subnet? (Choose all that apply.)
A. 192.168.1.50, 255.255.255.192
B. 192.168.1.100, 255.255.255.192
C. 192.168.1.165, 255.255.255.192
D. 192.168.1.189, 255.255.255.192
C, D. Both 192.168.1.165 and 192.168.1.189 are on the same subnet since bits 25 and 26 are the same (10). Bits 25 and 26 are 00 for 192.168.1.50, and 01 for 192.168.1.100 so these two are on different subnets from the any of the other IP addresses.
An administrator decides to block Telnet access to an internal network from any remote device on the Internet. Which of the following is the best choice to accomplish this?
A. Block port 22 at the host firewall
B. Block port 22 on internal routers
C. Block port 23 at the network firewall
D. Block port 23 on internal routers
C. You can block all telnet traffic into the network by blocking port 23 on the network firewall. Port 22 is used for SSH, SCP or SFTP, not Telnet (unless Telnet is encrypted with SSH). Additionally, blocking it at the host firewall only blocks it to the host, not the network. It’s easier to block the port once at the firewall rather than block the port on all internal routers. Additionally, the scenario states that the goal is to block access from the Internet, but Telnet may be authorized internally.
What port does SFTP use? A. 22 B. 23 C. 443 D. 1443
A. Secure File Transfer Protocol (SFTP) uses port 22, as do other protocols encrypted with Secure Shell (SSH) such as Secure Copy (SCP). Telnet uses port 23. HTTPS uses port 443. Microsoft’s SQL Server uses port 1443.
What ports do HTTP and HTTPS use? A. 20 and 21 B. 22 and 25 C. 80 and 443 D. 80 and 1433
C. Hypertext Transfer Protocol (HTTP) uses port 80 and HTTP Secure (HTTPS) uses port 443, and they are both used to transfer web pages. FTP uses ports 20 and 21. Microsoft’s SQL server uses port 1433. SFTP and SCP use port 22. SMTP uses port 25.
What port does SMTP use? A. 22 B. 25 C. 110 D. 143
B. Simple Mail Transfer Protocol (SMTP) uses port 25. SCP, TFTP, and SSH all use port 22. POP3 uses port 110. IMAP4 uses port 143.
Of the following choices, what ports are used by NetBIOS? (Choose two.) A. 80 B. 137 C. 139 D. 3389
B, C. NetBIOS uses ports 137, 138, and 139. HTTP uses port 80, and remote desktop services uses port 3389.
Your organization uses switches for connectivity. Of the following choices, what will protect the switch?
A. Disable unused MAC addresses
B. Disable unused ports
C. Disable unused IPv4 addresses
D. Disable unused IPv6 addresses
B. Disabling unused ports is a part of basic port security. While switches can associate MAC addresses associated with ports, it’s not possible to disable unused MAC addresses on the switch. Switches track traffic based on MAC addresses, not IP addresses.
A user plugged a cable into two RJ-45 wall jacks connected to unused ports on a switch. In a short period, this disrupted the overall network performance. What should you do to protect against this problem in the future?
A. Enable loop protection on the switch
B. Disable port security
C. Use a VLAN
D. Create DMZ
A. Loop protection such as Spanning Tree Protocol (STP) protects against the switching loop problem described in the scenario. While disabling unused ports may help against this problem, you do this by implementing port security, not disabling port security. A DMZ is used to host Internet facing servers and isn’t relevant in this situation. VLANs can logically separate computers using the same switch but do not prevent switching loops.
What can you use to logically separate computers in two different departments within a company? A. A hub B. A VLAN C. NAT D. A flood guard
B. A virtual local area network (VLAN) can group several different computers into a virtual network, or logically separate the computers in two different departments. A hub doesn’t have any intelligence and can’t separate the computers. NAT translates private IP addresses to public IP addresses, and public back to private. A flood guard protects against SYN flood attacks.
Most firewalls have a default rule placed at the end of the firewall’s ACL. Which of the following is the most likely default rule? A. Deny any any B. Deny ICMP all C. Allow all all D. Allow TCP all
A. A deny any any or drop all statement is placed at the end of an ACL and enforces an implicit deny strategy. While many firewalls include a rule to deny ICMP traffic (such as pings or ICMP sweeps), it isn’t a default rule and wouldn’t be placed last. An allow all all rule allows all protocol traffic that wasn’t previously blocked but is rarely (if ever) used in a firewall. Similarly, it’s rare to allow all TCP traffic on any port. Instead, a firewall uses an implicit deny principle by specifying what is allowed, and blocking everything else.