Chapter 11 Flashcards
(20 cards)
Which of the following statements about IDS is true?
Ideal for critical assets but can impact legitimate traffic
Traffic halts until investigation and decision
Stops attacks immediately upon detection
Monitors network traffic, detects known attack patterns, and alerts administrators
Monitors network traffic, detects known attack patterns, and alerts administrators
IDS stands for Intrusion Detection System, which is essential for network security.
Which security technology can restrict device functions (e.g., camera use outside the designated area)?
Asset Tags
Colocation cages
CCTV
Geofencing
Geofencing
Geofencing uses GPS or RFID to create virtual geographic boundaries.
Which category of IoT devices are often controlled through mobile devices?
Smart city devices
Consumer devices
Industrial devices
Healthcare devices
Consumer devices
Consumer IoT devices include smart home technology like thermostats and security cameras.
In a screen subnet, which firewall filters communications between hosts in the perimeter and hosts on the LAN?
Perimeter firewall
Screening firewall
External firewall
Internal firewall
Internal firewall
Which category of IoT devices improves efficiency and safety?
Industrial devices
Healthcare devices
Consumer devices
Smart city devices
Industrial devices
Industrial IoT devices are used in manufacturing and production environments.
Which of the following statements about ‘zone-based security’ is NOT true?
Ensures that traffic does not flow between zones
Controls access
Minimizes risk
Zones represent a region with specific security requirements
Ensures that traffic does not flow between zones
In which of the following zones is separated from internal networks to prevent direct attacks?
Guest Network
Private Security Networks
Private Client Networks
Public Server Network
Public Server Network
Which of the following is NOT a method used by an IPS to protect against an attack?
Throttle bandwidth to the attacking host.
End the session by sending a TCP reset packet to the attacking host
Modify suspect packets to render them harmless.
Apply a permanent filter on the firewall to block the attacker’s IP address
Apply a permanent filter on the firewall to block the attacker’s IP address.
Which of the following is considered part of a smart home?
Telephone
Laptop
Thermostat
TV
Thermostat
Which label applies to the growing ecosystem of smart devices that send and receive data via wireless network connections?
Internet of Things (IoT)
Internet of smart devices
Dynamic environment
The smartnet
Internet of Things (IoT)
What is a major concern regarding IoT devices?
Accessibility
Short life span
Availability
Privacy
Privacy
In a screen subnet, which firewall restricts traffic on the external/public interface and allows permitted traffic to the hosts in the perimeter zone subnet?
Screening firewall
Internal firewall
Perimeter firewall
External firewall
Screening firewall
In which of the following zones is access tightly controlled?
Public Server Network
Guest Network
Private Client Networks
Private Security Networks
Private Security Networks
What is the main drawback of anomaly-based detection?
Only available on IPS devices.
All of the these are drawbacks.
IDS must be kept up to date with the latest anomaly patterns.
It generates high levels of false positives, where legitimate traffic is flagged as malicious
It generates high levels of false positives, where legitimate traffic is flagged as malicious
Which of the following is the MOST important way to prevent console access to a network switch?
Set the console and enable secret passwords.
Keep the switch in a room that is locked by a keypad.
Disconnect the console cable when not in use.
Implement an access list to prevent console connections
Keep the switch in a room that is locked by a keypad.
Which of the following statements is true regarding ‘network zones’?
A zone is an area where all hosts have the same level of trust.
A zone with hosts that have low trust will have a minimal attack surface.
These rules are enforced by a security device—typically a switch.
Network traffic between zones should be unrestricted by policies and rules.
A zone is an area where all hosts have the same level of trust.
Five salespeople work out of your office. What is the BEST way to address concerns about laptops being taken?
Require strong passwords in the Local Security Policy.
Implement screensaver passwords.
Encrypt all company data on the hard drives.
Use cable locks to chain the laptops to the desks
Use cable locks to chain the laptops to the desks.
An IDS is configured with __________ patterns. Each pattern represents a known type of malicious activity.
traffic
signature
anomaly
malware
signature
Which of the following is NOT one of the risks of inadequate physical security?
Data Theft
Hardware Damage
Malware Exploits
Unauthorized Access
Malware Exploits
The internet of things is a natural extension of ____________.
the internet
smart devices
SCADA
smart networks
SCADA