Chapter 11 Flashcards

(20 cards)

1
Q

Which of the following statements about IDS is true?

Ideal for critical assets but can impact legitimate traffic

Traffic halts until investigation and decision

Stops attacks immediately upon detection

Monitors network traffic, detects known attack patterns, and alerts administrators

A

Monitors network traffic, detects known attack patterns, and alerts administrators

IDS stands for Intrusion Detection System, which is essential for network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which security technology can restrict device functions (e.g., camera use outside the designated area)?

Asset Tags

Colocation cages

CCTV

Geofencing

A

Geofencing

Geofencing uses GPS or RFID to create virtual geographic boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which category of IoT devices are often controlled through mobile devices?

Smart city devices

Consumer devices

Industrial devices

Healthcare devices

A

Consumer devices

Consumer IoT devices include smart home technology like thermostats and security cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a screen subnet, which firewall filters communications between hosts in the perimeter and hosts on the LAN?

Perimeter firewall

Screening firewall

External firewall

Internal firewall

A

Internal firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which category of IoT devices improves efficiency and safety?

Industrial devices

Healthcare devices

Consumer devices

Smart city devices

A

Industrial devices

Industrial IoT devices are used in manufacturing and production environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements about ‘zone-based security’ is NOT true?

Ensures that traffic does not flow between zones

Controls access

Minimizes risk

Zones represent a region with specific security requirements

A

Ensures that traffic does not flow between zones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which of the following zones is separated from internal networks to prevent direct attacks?

Guest Network

Private Security Networks

Private Client Networks

Public Server Network

A

Public Server Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT a method used by an IPS to protect against an attack?

Throttle bandwidth to the attacking host.

End the session by sending a TCP reset packet to the attacking host

Modify suspect packets to render them harmless.

Apply a permanent filter on the firewall to block the attacker’s IP address

A

Apply a permanent filter on the firewall to block the attacker’s IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered part of a smart home?

Telephone

Laptop

Thermostat

TV

A

Thermostat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which label applies to the growing ecosystem of smart devices that send and receive data via wireless network connections?

Internet of Things (IoT)

Internet of smart devices

Dynamic environment

The smartnet

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a major concern regarding IoT devices?

Accessibility

Short life span

Availability

Privacy

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a screen subnet, which firewall restricts traffic on the external/public interface and allows permitted traffic to the hosts in the perimeter zone subnet?

Screening firewall

Internal firewall

Perimeter firewall

External firewall

A

Screening firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which of the following zones is access tightly controlled?

Public Server Network

Guest Network

Private Client Networks

Private Security Networks

A

Private Security Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the main drawback of anomaly-based detection?

Only available on IPS devices.

All of the these are drawbacks.

IDS must be kept up to date with the latest anomaly patterns.

It generates high levels of false positives, where legitimate traffic is flagged as malicious

A

It generates high levels of false positives, where legitimate traffic is flagged as malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the MOST important way to prevent console access to a network switch?

Set the console and enable secret passwords.

Keep the switch in a room that is locked by a keypad.

Disconnect the console cable when not in use.

Implement an access list to prevent console connections

A

Keep the switch in a room that is locked by a keypad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements is true regarding ‘network zones’?

A zone is an area where all hosts have the same level of trust.

A zone with hosts that have low trust will have a minimal attack surface.

These rules are enforced by a security device—typically a switch.

Network traffic between zones should be unrestricted by policies and rules.

A

A zone is an area where all hosts have the same level of trust.

17
Q

Five salespeople work out of your office. What is the BEST way to address concerns about laptops being taken?

Require strong passwords in the Local Security Policy.

Implement screensaver passwords.

Encrypt all company data on the hard drives.

Use cable locks to chain the laptops to the desks

A

Use cable locks to chain the laptops to the desks.

18
Q

An IDS is configured with __________ patterns. Each pattern represents a known type of malicious activity.

traffic

signature

anomaly

malware

19
Q

Which of the following is NOT one of the risks of inadequate physical security?

Data Theft

Hardware Damage

Malware Exploits

Unauthorized Access

A

Malware Exploits

20
Q

The internet of things is a natural extension of ____________.

the internet

smart devices

SCADA

smart networks