Ch 10: Security in Network Design Flashcards

1
Q

Which of the following is an example of proxy server software?

A

Squid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is NOT a variable that an network access control list can filter traffic with?

A

The operating system used by the source or destination device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In ACL statements, using the “any” keyword is equivalent to using a wildcard mask of what value?

A

255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What kind of firewall can block designated types of traffic based on application data contained within packets?

A

content-filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a SIEM (Security Information and Event Management) system utilized for?

A

It is a system used to evaluate data from security devices and generate alerts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

A

STP must first select the root bridge, or master bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

A

BPDU guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

A

Shortest Path Bridging (SPB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

A

mac-limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enforcing a virtual security perimeter using a client’s geographic location is known by what term?

A

geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using Kerberos, what is the purpose of a ticket?

A

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which legacy authentication protocol requires mutual authentication?

A

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

A

Protected EAP (PEAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

A

802.11i

17
Q

What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?

A

Rapid Spanning Tree Protocol (RSTP)

18
Q

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

A

Use the switchport port-security command to enable MAC filtering.

19
Q

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

A

authorization

20
Q

What statement regarding role-based access control is accurate?

A

RBAC allows a network administrator to base privileges and permissions around a detailed description of a user’s roles or jobs.

21
Q

Which encryption standard was originally utilized with WPA’s TKIP?

A

Rivest Cipher 4 (RC4)

22
Q

The Wired Equivalent Privacy standard had what significant disadvantage?

A

It used a shared encryption key for all clients, and the key might never change.

23
Q

In Open System Authentication, how does authentication occur?

A

The client “authenticates” using only the SSID name. In other words, no real authentication occurs.

24
Q

The Group Policy utility can be opened by typing what name into a Run box?

A

gpedit.msc

25
Q

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

A

Only one root port, which is the bridge’s port that is closest to the root bridge, can forward.

26
Q

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?

A

port mirroring

27
Q

In regards to the use of local authentication, what statement is accurate?

A

Local authentication is network and server failure tolerant.

28
Q

What scenario might be ideal for the use of root guard in configuring a switch?

A

You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP

29
Q

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn’t change?

A

file integrity monitoring (FIM)

30
Q

What statement correctly describes a stateless firewall?

A

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.