ch 11 Flashcards

1
Q

As a network analyst, you want the ACL (access control list) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. Which of the following commands will you use in this scenario?

A

access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following refers to a division of labor that ensures no one person can singlehandedly compromise the security of data, finances, or other resources?

A

SoD (Separation of Duties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You as a network administrator want to have a check on the ARP (address resolution protocol) vulnerabilities in your organization so that you can prevent a switch against possible ARP spoofing attacks and MAC flooding. Which of the following will you use in this scenario?

A

DAI (Dynamic ARP Inspection)

is a configuration on a switch that compares incoming messages with the switch’s DHCP snooping binding table to determine whether the message’s source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. DAI helps protect against ARP spoofing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following stands in-line between the attacker and the targeted network or host where it can prevent traffic from reaching that network or host?

A

IPS (Intrusion Prevention System)

is a stand-alone device, an application, or a built-in feature running on a workstation, server, switch, router, or firewall that stands in-line between an attacker and the targeted network or host and can prevent traffic from reaching that network or host.

*Pic: Placement of IPS devices and software on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Johnathan is the network engineer of an organization that restricts the use of certain webpages. As he does not have any pending work, he decides to take a break and watch a movie online until a task is assigned to him. Analyze which of the following actions is best suited for him in this situation so that the IP address of the organization is not compromised.

A

Use proxy servers to mask Internet activities

Proxy Server is a server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

*Pic: A proxy server is used to connect to the nternet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You are a network engineer at BHMS Ltd. The network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. Which of the following will you use in such a scenario?

A

ACL (Access Control List)

is a list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MNT Enterprises has hired you as a network administrator to help the organization design a more comprehensive traffic analysis and protection tool to protect the entire network from hackers trying to flood the network with traffic. Which of the following will you use in this situation?

A

NIPS (network-based intrusion prevention system)

is a type of intrusion prevention that protects an entire network and is situated at the edge of the network or in a network’s screened subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IDS (intrusion detection system) has been installed in your organization as a stand-alone device to monitor network traffic and to generate alerts about suspicious activities. You as a network analyst have been assigned to check the effectiveness of the device. You notice that the effectiveness of the IDS has significantly come down since its installation because it has not been updated. Which of the following processes will you use in updating the IDS?

A

Signature Management

is the process of regularly updating the signatures used to monitor a network’s traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hilary is an employee of Munich Securities. The HR manager has received a complaint from one of her fellow employees about her misusing her account. You as a network administrator want to conduct a user configuration check to ensure that there are no vulnerabilities to the network configuration. Which of the elements of the AAAA acronym will you use to apply this security measure?

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which authorization method grants access to a user when the user’s classification and category match those of a resource?

A

MAC (mandatory access control)

is a method of access control where resources are organized into hierarchical classifications, such as “confidential” or “top secret,” and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user’s classification and category match those of a resource, then the user is given access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The HR manager of Veep Communications notices a lot of employees waste valuable time surfing social media websites. The HR manager requests you (a network administrator) to prevent the employees’ access to these websites. Which of the following firewalls will you use in this scenario?

A

Application Layer Firewall

is a firewall that can block designated types of traffic based on application data contained within packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As a network administrator, you are already aware of the possible option of using a default trust relationship between a network device and another by a hacker to access an entire network. Which of the following security measures will you use to prevent a possible DoS attack that can be induced by sending high volumes of router advertisement messages?

A

RA Guard

A feature that can be configured on switches to filter RA messages according to interface, MAC or IP address, router priority, or other factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a device or an application that stores or generates information known only to its authorized user?

A

Security Token

is a device or piece of software used for authentication that stores or generates information, such as a series of numbers or letters, known only to its authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In which of the following do the bits work opposite of how bits in a subnet work?

A

Wildcard Mask

statements can also specify network segments (groups of IP addresses) by using a network address for the segment and a wildcard mask. The bits in a wildcard mask work opposite of how bits in a subnet mask work. The 0s in the wildcard mask say to match the IP address bits to the network address given, and the 1s say you don’t care what the value of those bits are. For example, a wildcard mask of 0.0.0.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following will you use to monitor and analyze data stored in logs?

A

SIEM (Security Information and Event Management)

is software that can be configured to evaluate data logs from IDS, IPS, firewalls, and proxy servers to detect significant events that require the attention of IT staff according to predefined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Darwin has purchased a laptop for the purpose of running his stock brokerage activities from home. He has contracted Navin, a network engineer, to install a software specifically for his workstation so that the software can protect the network from certain traffic. Analyze which of the following firewalls is best applicable in this scenario.

A

A Host-Based Firewall

is a firewall that only protects the computer on which it’s installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Yugen is a network administrator who is in the process of configuring CoPP (control plane policing) on a router. In this scenario, ICMP (Internet Network Control Protocol) traffic is permitted with no limits from one trusted device. All other ICMP traffic is limited and, when exceeding that limit, is dropped. Analyze which of the following commands Yugen should use to create a class map named limit-icmp that will classify traffic according to defined criteria such as an ACL.

A

class-map limit-icmp

18
Q

Which of the following technologies selectively filters or blocks traffic between networks?

A

Firewall

19
Q

You as a network administrator want a switch to determine if the message’s source IP address is appropriately matched with its source MAC address according to DHCP assignments on the network. Which of the following switch security configurations will you use alongside DAI on a network switch in this scenario?

A

DHCP Snooping

is a security feature on switches whereby DHCP messages on the network are checked and filtered.

20
Q

Which of the following will act as a filter to instruct the router to permit or deny traffic from travelling through the network?

A

ACL (Access Control List)

is a list of statements used by a router or other device to permit or deny the forwarding of traffic on a network based on one or more criteria.

21
Q

You as a network administrator plan on using an NIDS (network-based intrusion detection system) to protect your network. You plan on doing this by monitoring the traffic that will be carried by a switch. Which of the following will you use in such a scenario?

A

SPAN (Switched Port Analyser)

a.k.a Port Mirroring

which is a monitoring technique in which one port on a switch is configured to send a copy of all the switch’s traffic to the device connected to the port. It captures some of traffic crossing a switch, but TAP can capture all traffic between two devices.

22
Q

A special kind of DoS (denial of service) attack has attacked an AAA server with authentication requests that must all be processed and responded to. The network administrator has analyzed the situation and requested you, a network engineer, to use a command by which you can reclaim compromised resources in case of a similar attack in the future. Which of the following commands will you use in this scenario?

A

floodguard

by default, a floodguard feature might be configured on the AAA server to reclaim compromised resources. Floodguard settings can be changed with the floodguard command.

23
Q

Which of the following firewalls manages each incoming packet as a stand-alone entity without regard to currently active connections?

A

Stateless Firewall

24
Q

Bruno is a network engineer who is tasked with adding a separate layer of protection to the control plane of a router. He wants messages with a bps (bits per second) rate below the threshold 7000 to be transmitted and the messages with a threshold above 7000 to be dropped. Analyze which of the following commands Bruno should use in pmap configuration mode in this scenario.

A

police 8000 conform-action transmit exceed-action drop

25
Q

Fred works as the network administrator at Globecomm Communications. The HR team at Globecomm has come up with a new working policy for the employees. This policy allows the employees to freely work at any time of the day as long as they submit the work within 24 hours. Keeping this policy in view, Fred has to work on strengthening the security of the network by adding additional authentication restrictions. Analyze which of the following Fred should do in this scenario.

A

Restrict some user accounts to a specific number of hours of logged-on time

26
Q

As a network administrator, Murphy wants to add additional layers of security to prevent hackers from penetrating the network. In order to achieve this, he plans on adding additional authentication restrictions that might strengthen network security. Analyze which of the following he should do in this context.

A

Set a limit on consecutive login attempts

27
Q

Identify and analyze whether the implicit deny rule be applied to the following statements or not.

A

When the incoming packet is denied in the third test by the ACL

28
Q

You are employed as a network administrator of Vincent Motors. An unreleased blueprint of a new car model of Vincent Motors has been leaked on the Internet. You assume that an intruder must have succeeded in gaining access to your network in order to copy the blueprint. Which of the following access control techniques will you use so that such an activity can be detected in the future?

A

Accounting

in the context of network security, the process of logging users’ access and activities on a network.

29
Q

Which authorization method allows a network administrator to receive from a user’s supervisor a detailed description of the roles or jobs the user performs for the organization?

A

RBAC (Role-Based Access Control)

30
Q

Which of the following can capture all traffic traversing a network connection?

A

TAP (Test Access Point)

31
Q

You as a network engineer have finished setting up local security policies for your Windows 10 operating system. Which of the following commands will you use to implement your changes in this scenario?

A

gpudate

32
Q

You are the network engineer for Muhan Mobile Services. The network administrator has asked you to separate the authentication, auditing, and authorization process. Which of the following tools will you use in such a scenario?

A

TACACS+ (Terminal Access Control System Access Control System Plus)

is a Cisco proprietary protocol that provides AAA services.

33
Q

Michelle has been inducted into an organization as a trainee. Which of the following firewall software should she use to protect only the computer on which it is installed?

A

Host-Based Firewall

34
Q

You have been working as a network engineer with an organization. You have decided to implement information access control to limit the users and devices that can get to your data and other network resources. For this purpose, you plan on using a username and password as a measure of security to grant any user access to your organization’s resources. Which of the elements of the AAAA acronym will you use to apply this security measure?

A

Authentication

35
Q

Identify which of the following terms defines the process of verifying a user’s credentials.

A

Authentication

36
Q

The IT department of Mascom Telecom has requested you to fix an error that seems to have been associated with a possible malware attack. This particular malware file seems to have attacked the operating system files on the computer. Which of the following should you use to avoid or alert such an attack in the future?

A

FIM (File Integrity Monitoring)

is a security technique that alerts the system of any changes made to files that shouldn’t change, such as operating system files.

37
Q

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won’t receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?

A

Proxy Server

is a server acting as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.

38
Q

Which of the following commands is used to assign a statement to an ACL on Cisco routers?

A

Access-List

39
Q

Which of the following issues keys to clients during initial authentication?

A

KDC (Key Distribution Center)

40
Q

Which of the following is used to issue tickets to an authenticated client for access to services on the network?

A

TGS