Chapter 1 Security Architecture (Sybex) Flashcards
Your organization experienced a security event that led to the loss and disruption of services. You were chosen to investigate the disruption to prevent the risk of it happening again. What is this process called?
A. Incident management
B. Forensic tasks
C. Mandatory vacation
D. Job rotation
A. Incident management
Explanation:
An incident is an event that could lead to loss of, or disruption, an organizations operation, services or functions. Incident management is a term describing the activities of an organization to identify, correct and analyze to prevent a future occurrence. Forensics are performed to find artifacts in an environment. Mandatory vacations and Job Rotations are administrative controls
Brett is a new CISO, and he is evaluating different controls for availability. Which set of controls should he choose?
A. RAID 1, Classification of data and load balancing
B. Digital signatures, encryption and hashes
C. Steganography, ACLs and vulnerability management
D. Checksums, DOS attacks and RAID 0
A. RAID 1, Classification of data and load balancing
Explanation:
RAID 1 is for redundancy, the data’s level of sensitivity is classified based on importance, which is correlated to security measures and who has access, and load balancers determine which server in a pool is available and route requests to that server. The other answers do not pertain
Charles has received final documentation from a compliance audit. The report suggested his organization should implement a complementary security tool to work with the firewall to detect any attempt at scanning. Which device does Charles choose?
A. RAS
B. PBX
C. IDS
D. DDT
C. IDS
Explanation:
An IDS is used to detect against intrusion from the outside untrusted network into an internal trusted network. It can be deployed to watch behind the firewall for traffic that was successful in circumventing the firewall, as well as for activity originating from inside the trusted network. A RAS (remote access service) is a combination of hardware and software to enable remote access tools connecting a client to a host computer. A private branch exchange (PBX) is a private telephone network used in a company
Nicole is the security administrator for a large governmental agency. She has implemented port security, restricted network traffic and installed NIDS, firewalls and spam filters. She thinks the network is secure. Now she wants to focus on endpoint security. What is the most comprehensive plan for her to follow?
A. Antimalware/virus/spyware, host based firewall and MFA
B. Antivirus/spam, host based IDS and TFA
C. Antimalware/virus, host based IDS and biometrics
D. Antivirus/spam, host based IDS and SSO
A. Antimalware/virus/spyware, host based firewall and MFA
Explanation:
You want to protect your endpoints from malware, viruses and spyware. A host based firewall will prevent malicious traffic, where the IDS will only report there is an intrusion. All two factor authentication (TFA) is a MFA but not all MFA is TFA
Sally’s CISO asked her to recommend an intrusion system to recognize intrusions traversing the network and send email alerts to the IT staff when one is detected. What type of intrusion system does the CISO want?
A. HIDS
B. NIDS
C. HIPS
D. NIPS
B. NIDS
Explanation:
A network based intrusion detection system (NIDS) monitors traffic traversing the network and can alert based on observing attacks and intrusions. The alerts can come in various forms, including email and text messages
Kenneth is the CISO of an engineering organization. He asked the security department to recommend a system to be placed on business critical servers to detect and stop intrusions. Which of the following will meet the CISOs requirements?
A. HIPS
B. NIDS
C. HIDS
D. NIPS
A. HIPS
Explanation:
A host based intrusion prevention system (HIPS) is an intrusion prevention system used to detect intrusions on a host system like a server and stop those intrusions from compromising a system
Paul’s company has discovered that some of his organizations employees are using personal devices, including cell phones, within highly secure areas. The CISO wants to know which employees are violating this policy. Which of the following devices can inform the CISO who is violating this policy?
A. DLP
B. WIDS
C. NIPS
D. Firewall
B. WIDS
Explanation:
Wireless intrusion detection system (WIDS) solutions can locate and identify WiFi devices as well as Bluetooth, Bluetooth Lower Energy and devices emitting cellular signals. This means a WIDS can discover a cell phone even when the WiFi and Bluetooth are not active. Network IDSs and IPSs are looking for malicious network based activity
Tom’s company discovered that some of her organizations employees are copying corporate documents to Microsoft blob cloud drives outside the control of the company. She has been instructed to stop this practice from occurring. Which of the following can stop this practice from happening?
A. DLP
B. NIDS
C. NIPS
D. Firewall
A. DLP
Explanation:
DLP systems are designed to examine data as it moves off the host system looking for unauthorized transfers.
Troy must decide about his organizations file integrity monitoring (FIM). Standalone FIM generally means file analysis only. Another option is to integrate it with the host so that Troy can detect threats in other areas, such as memory or an I/O. For the integration, which of the following does Troy need to use?
A. HIDS
B. ADVFIM
C. NIDS
D. Change management
A. HIDS
Explanation:
Some more advanced FIM solutions are part of a host based intrusion detection system (HIDS). As a general rule, they can detect threats in other areas, not just files
Lisa is building a network intrusion detection system (NIDS). What can NIDS do with encrypted network traffic?
A. Look for viruses
B. Examine contents of email
C. Bypass VPN
D. Nothing
D. Nothing
Explanation:
Encrypted packets are not processed by most intrusion detection devices. Other potential issues with NIDSs are high speed network data overload, tuning difficulties and signature deployment lag time
What system is used to collect and analyze data logs from various network devices and to report detected security events?
A. Syslog server
B. NIPS
C. WIPS
D. SIEM Systems
D. SIEM Systems
Explanation:
A SIEM system is used to collect logs from various devices on a network and to analyze those logs, looking for security issues. Because a SIEM can review logs from various devices, it gets a holistic view of actions going on over the network, as opposed to a single appliance analyzing only traffic flowing through it.
The IT department decided to implement a security appliance in front of their web servers to inspect HTTP/HTTPS/SOAP traffic for malicious activity. Which of the following is the best solution to use?
A. Screened host firewall
B. Packet filter firewall
C. DMZ
D. WAF
D. WAF
Explanation:
A WAF is used to inspect OSI Layer 7 data for malicious activity. HTTP/HTTPS/SOAP are all web application protocols that operate at OSI Layer 7.
A security audit was conducted for your organization. It found that a computer plugged into any Ethernet port in its shipping facility was able to access network resources without authentication. You are directed to fix this security issue. Which standard, if implemented, could resolve this issue?
A. 802.1x
B. 802.3
C. 802.1q
D. 802.11
A. 802.1x
Explanation:
The 802.1x standard from IEEE provides for port-based network access control. It provides a means of authenticating devices that attempt to connect to the network. Based on authentication, the Ethernet port can be placed in the appropriate VLAN for that device. If a device does not authenticate, the port could be placed into a quarantined VLAN or configure for Internet access only
Your CISO is concerned with unauthorized network access to the corporate wireless network. You want to set a mechanism in place that not only authenticates the wireless devices but also requires them to meet a predefined corporate policy before allowing them on the network. What technology best performs this function?
A. HIDS
B. NAC
C. Software agent
D. NIPS
B. NAC
Explanation:
Not only can NAC authenticate network devices, but it can also ensure the enforcement of corporate policies governing these devices. If a system is not in compliance with the corporate policy, the device can be quarantined until such time when the policy failures are remediated
David’s security team is implementing NAC for authentication as well as corporate policy enforcement. The team wants to install software on the devices to perform these tasks. In the context of NAC, what is this software called?
A. Program
B. Process
C. Agent
D. Thread
C. Agent
Explanation:
The software installed on dev ices tha t will connect to the network using NAC is called an agent. A program is a set of instructions that allow for a certain kind of digital operation
Grace is investigating the encryption of data at rest and data in transit and trying to determine which algorithm is best in each situation. Which of the following does not contain data at rest?
A. SAN
B. NAS
C. SSD
D. VPN
D. VPN
Explanation:
Data at rest is stored on a device. A VPN contains data moving, which means in transit
Your employees need internal access while traveling to remote locations. You need a service that enables them to securely connect back to a private corporate network from a public network to log into a centralized portal. You want the traffic to be encrypted. Which of the following is the best tool?
A. WiFi
B. VPN
C. RDP
D. NIC
B. VPN
Explanation:
A virtual private network (VPN) enables employees to access sensitive data and systems on mobile devices while away from the secure corporate network.
Roberts employees complain that when they connect to the network through the VPN, they cannot view their social media posts and pictures. What most likely has been implemented?
A. Split tunnels
B. DNS tunneling
C. ARP cache
D. Full tunnels
D. Full tunnels
Explanation:
In a full tunnel, all network traffic is forced to go through the VPN. Depending on how its configured, you may only have access to the internal network while the VPN is active. Split VPN tunnels only partially encrypt traffic
Robin’s company is merging with another healthcare organization. The stakeholders are discussing the security aspects of combining digital communications. The main agreed upon criterion for compliance and security is protecting the sharing of the business’s domains. What is the best option for this organization?
A. DNSSEC
B. TLS
C. SSL 2.0
D. Keeping both entities separate
A. DNSSEC
Explanation:
DNSSEC strengthens authentication using digital signatures based on public/private key cryptography. With DNSSEC, you have data origin authentication as well as data integrity
You are a network security administrator for a SOHO. Your staff tends to work from coffee shops without understanding the need for a VPN. You must show them why this can be dangerous. What network traffic packets are commonly captured and used in a replay attack?
A. Packet headers
B. Authentication
C. FTP
D. DNS
B. Authentication
Explanation:
Authentication traffic is the most commonly captured and reused network traffic used in a replay attack. If an attacker is able to replay the stream of authentication packets correctly, they gain access to the same systems as the original user
Sally needs to implement a network security device at the border of her corporate network and the Internet. This device filters network traffic based on source and destination IP addresses, source and destination port numbers and protocols. Which network security device best suits her needs?
A. Packet filter firewall
B. Proxy server
C. HSM
D. DMZ
A. Packet filter firewall
Explanation:
A packet filter firewall inspects packets traversing the network and allows you to control the traffic based on source and destination IP, source and destination port and the protocol utilized for communication. A proxy server is a server application or appliance that acts as an intermediary for requests from client machines looking for resources.
The IT security department was tasked with recommending a single security device that can perform various security functions. The security functions include antivirus protection, antispyware, a firewall and an IDP. What device should the IT security department recommend?
A. Next generation firewall
B. Unified threat management system
C. Quantum proxy
D. Next generation IDP
B. Unified threat management system
Explanation:
A unified threat management (UTM) system is a single device that provides multiple security functions, including antivirus protection, antispyware, a firewall and an IDP. A concern with using a UTM is that it could become a single point of failure.
One of your network administrators reports that they cannot connect to a device on the local network using its IP address. The device is up and running with an IP address of 10.0.0.5. Other hots can communicate with the device. The default gateway is 10.0.0.1 and your local IP address is 10.0.0.3. What is the best type of scan to run to find the MAC of the offending machine?
A. ARP
B. NAT Gateway
C. IPConfig
D. IFConfig
A. ARP
Explanation:
An Address Resolution Protocol (ARP) scan is performed to learn MAC addresses. You run an ARP request to query the MAC address of a device with a known IP Address. When the ARP reply is received, you populate the ARP table, which maps the IP to a MAC.
Ronald has architected his network to hide the source of a network connection. What device has he most probably used?
A. Proxy firewall
B. Internet gateway
C. Layer 3 switch
D. Bastion host
A. Proxy firewall
Explanation:
A proxy firewall is also known as an application level gateway firewall. It is used primarily to hide the source off a network connection. This allows you to hide the true source of the traffic.