Chapter 4 Flashcards

1
Q

You have hired 10 new temporary workers who will be with the company for three months. You want to make sure that the user accounts cannot be used for login after that time period. What should you do?

Configure day/time restrictions in the user accounts.

Configure account policies in Group Policy.

Configure account lockout in Group Policy.

Configure account expiration in the user accounts.

A

Configure account expiration in the user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Microsoft tool can be used to review a system’s security configuration against recommended settings?

Microsoft Security Compliance Toolkit
Registry Editor
Windows Defender
Microsoft Internet Explorer

A

Microsoft Security Compliance Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of update should be prioritized even outside of a normal patching window?

Microsoft updates

Monthly updates

Critical updates

Security updates

A

Critical updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prepare to Document means establishing the process you will use to document your network.

Which of the following makes this documentation more useful?

Identify the choke points on the network.

Automate administration as much as possible.

Have a printed hard copy kept in a secure location.

Identify who is responsible for each device.

A

Have a printed hard copy kept in a secure location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Documenting procedures and processes are part of which milestone in the NSA’s Manageable Network Plan?

Reach Your Network
Document Your Network
Prepare to Document
Control Your Network

A

Document Your Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which milestone should you use a network scanner and then confirm the scan manually with a room-by-room walkthrough?

Prepare to Document
Reach Your Network
Map Your Network
Protect Your Network

A

Map Your Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows Server Update Services (WSUS) is used to accomplish which part of a manageable network?

Patch management
User access
Documentation
Device accessibility

A

Patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have recently been hired as the new network administrator for a startup company. The company’s network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network.

You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network.

Which tasks should you complete as a part of this milestone? (Select two.)

Create an approved application list for each network device.

Physically secure high-value systems.

Apply critical patches whenever they are released.

Identify and document each user on the network.

Set account expiration dates.

A

Physically secure high-value systems.

Identify and document each user on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For Milestone 4 (Reach Your Network), which of the following would be considered a secure protocol to use to reach your network?

SSH

HTTP

Telnet

FTP

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

As you go through the process of making your network more manageable, you discover that employees in the sales department are on the same network segment as the human resources department.

Which of the following steps can be used to isolate these departments?

Move the sales department into the DMZ.

Implement the principle of least privilege for the human resources department.

Identify the choke points on your network.

Create a separate VLAN for each department.

A

Create a separate VLAN for each department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following tools can you use on a Windows network to automatically distribute and install software and operating system patches on workstations? (Select two.)

WSUS

Group Policy

Security Configuration and Analysis

Security Templates

A

WSUS

Group Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following describes a configuration baseline?

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

The minimum services required for a server to function

A set of performance statistics that identifies normal operating performance

A

A list of common security settings that a group or all devices share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you consider security baselines?

Unchangeable

Suggestion

Static

Dynamic

A

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

By definition, what is the process of reducing security exposure and tightening security controls?

Active scanning

Passive reconnaissance

Social engineering

Hardening

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the strongest form of multi-factor authentication?

A password, a biometric scan, and a token device

Two passwords

Two-factor authentication

A password and a biometric scan

A

A password, a biometric scan, and a token device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have recently experienced a security incident with one of your servers. After some research, you determine that a new hotfix has recently been released, which would have protected the server.

Which of the following recommendations should you follow when applying the hotfix?

Test the hotfix and then apply it to all servers.

Apply the hotfix immediately to all servers.

Test the hotfix and then apply it to the server that had the problem.

Apply the hotfix immediately to the server. Apply the hotfix to other devices only as the security threat manifests itself.

A

Test the hotfix and then apply it to all servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following actions should you take to reduce the attack surface of a server?

Install the latest patches and hotfixes.

Disable unused services.

Install anti-malware software.

Install a host-based IDS.

A

Disable unused services.

18
Q

Which of the following do security templates allow you to do? (Select two.)

Block malicious websites

Quickly apply settings to multiple computers

Configure consistent security settings between devices

Fix a specific software problem

Apply new software patches

A

Quickly apply settings to multiple computers

Configure consistent security settings between devices

19
Q

You have just purchased a new network device and are getting ready to connect it to your network. Which of the following actions should you take to increase its security? (Select two.)

Remove any backdoors.

Change default account passwords.

Conduct privilege escalation.

Apply all patches and updates.

Implement separation of duties.

A

Change default account passwords.

Apply all patches and updates.

20
Q

Which of the following is defined as an operating system that comes hardened and validated to a specific security level as defined in the Common Criteria for Information Technology Security Evaluation (CC)?

UNIX

OS X

TOS

Windows

A

TOS

21
Q

You have placed a File Transfer Protocol (FTP) server in your DMZ behind your firewall. The FTP server is to be used to distribute software updates and demonstration versions of your products. However, users report that they are unable to access the FTP server.

What should you do to enable access?

Install a VPN.

Move the FTP outside of the firewall.

Open ports 20 and 21 for outbound connections.

Define user accounts for all external visitors.

A

Open ports 20 and 21 for outbound connections.

22
Q

FTPS uses which mechanism to provide security for authentication and data transfer?

SSL

Multi-factor authentication

IPsec

Token devices

A

SSL

23
Q

To transfer files to your company’s internal network from home, you use FTP. The administrator has recently implemented a firewall at the network perimeter and disabled as many ports as possible.

Now, you can no longer make the FTP connection. You suspect the firewall is causing the issue. Which ports need to remain open so you can still transfer the files? (Select two.)

443
80
23
20
21

A

21
20

24
Q

You want to close all ports associated with NetBIOS on your network’s firewalls to prevent attacks directed against NetBIOS. Which ports should you close?

67, 68

135, 137-139

161, 162

389, 636

A

135, 137-139

25
Q

Which of the following file transfer protocols use SSH to provide confidentiality during the transfer? (Select two.)

SCP
SFTP
FTP
FTPS
HTTPS

A

SCP
SFTP

26
Q

To increase security on your company’s internal network, the administrator has disabled as many ports as possible. However, now you can browse the internet, but you are unable to perform secure credit card transactions.

Which port needs to be enabled to allow secure transactions?

443
80
21
69
23

A

443

27
Q

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder.

Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file.

What should you do?

Remove Mark Mangum from the Managers group.

Add Mark Mangum to the ACL for the Confidential.xls file with Deny permissions.

Add Mark Mangum to the ACL for the Reports directory with Deny permissions.

Configure NTFS permissions for Confidential.xls to allow read-only.

A

Add Mark Mangum to the ACL for the Confidential.xls file with Deny permissions.

28
Q

You want to give all managers the ability to view and edit a certain file. To do so, you need to edit the discretionary access control list (DACL) associated with the file. You want to be able to easily add and remove managers as their job positions change.

What is the BEST way to accomplish this?

Create a distribution group for the managers. Add all users as members of the group. Add the group to the file’s DACL.

Add each user account to the file’s DACL.

Add one manager to the DACL that grants all permissions. Have this user add other managers as required.

Create a security group for the managers. Add all users as members of the group. Add the group to the file’s DACL.

A

Create a security group for the managers. Add all users as members of the group. Add the group to the file’s DACL.

29
Q

If Mark has a read-write permission to the share \fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action?

Rename the file.

Delete the file.

Read the file.

Change the contents of the file.

A

Read the file.

30
Q

You have a file server named Srv3 that holds files used by the development department. You want to allow users to access the files over the network and control access to files accessed through the network or through a local logon.

Which solution should you implement?

Share permissions and quotas

NTFS permissions and file screens

Share permissions and file screens

NTFS permissions and share permissions

A

NTFS permissions and share permissions

31
Q

Which command should you use to display both listening and non-listening sockets on your Linux system? (Tip: enter the command as if in Command Prompt.)

A

netstat -a

32
Q

Which command should you use to scan for open TCP ports on your Linux system? (Tip: enter the command as if in Command Prompt.)

A

nmap -sT

33
Q

You need to increase the security of your Linux system by finding and closing open ports. Which of the following commands should you use to locate open ports?

traceroute
nslookup
netstat
nmap

A

nmap

34
Q

What does the netstat -a command show?

All connected hosts

All listening sockets

All network users

All listening and non-listening sockets

A

All listening and non-listening sockets

35
Q

You want to make sure no unneeded software packages are running on your Linux server.

yum list packages
yum list rpm packages
yum list installed
yum list rpm installed

A

yum list installed

36
Q

Which action would you use in a rule to disallow a connection silently?

Forward
Drop
Reject
Accept

A

Drop

37
Q

In which of the iptables default chains would you configure a rule to allow an external device to access the HTTPS port on the Linux server?

Accept
Output
Forward
Input

A

Input

38
Q

Which type of packet would the sender receive if they sent a connection request to TCP port 25 on a server with the following command applied?

sudo iptables -A OUTPUT -p tcp –dport 25 -j REJECT

RST

SYN

ICMP Unreachable Port

ACK

A

RST

39
Q

You have configured the following rules. What is the effect?

sudo iptables -A INPUT -p tcp –dport 25 -m conntrack –ctstate NEW,ESTABLISHED -j ACCEPT
sudo iptables -A OUTPUT -p tcp –sport 25 -m conntrack –ctstate ESTABLISHED -j ACCEPT

Allow SSH traffic

Block SSH traffic

Allow SMTP traffic

Block SMTP traffic

A

Allow SMTP traffic

40
Q

Which command would you use to list all of the currently defined iptables rules?

sudo iptables -A INPUT -j DROP

sudo iptables -F

sudo iptables -L

sudo /sbin/iptables-save

A

sudo iptables -L