CompTIA Security+ Questions (Lesson 1-10) Flashcards
(163 cards)
Consider the types of zones within a network’s topology and locate the zone considered semi-trusted and requires hosts to authenticate to join.
Private network
Extranet
Internet
Anonymous
Extranet
Where should an administrator place an internet-facing host on the network?
DMZ
Bastion host
Extranet
Private network
DMZ
There are several types of security zones on a network. Analyze network activities to determine which of the following does NOT represent a security zone.
DMZ
Screened host
Wireless
Guest network
Screened host
Evaluate the typical weaknesses found in network architecture and determine which statement best aligns with a security weakness.
A company has a single network channel.
A company has many different systems to operate one service.
A company has a habit of implementing quick fixes.
A company has a flat network architecture.
A company has a flat network architecture.
Evaluate the following choices based on their potential to lead to a network breach. Select the choice that is NOT a network architecture weakness.
The network architecture is flat.
Services rely on the availability of several different systems.
The network relies on a single hardware server.
Not all hosts on the network can talk to one another.
Not all hosts on the network can talk to one another.
Identify the attack that can launch by running software against the CAM table on the same switch as the target.
MAC flooding
MAC spoofing
ARP poisoning attack
LLMNR
MAC flooding
MAC flooding is a variation of an ARP poisoning attack. While ARP poisoning is directed at hosts, MAC flooding is used to attack a switch.
Given that layer 2 does not recognize Time to Live, evaluate the potential problems to determine which of the following options prevents this issue.
ICMP
L2TP
NTP
STP
STP
Analyze the available detection techniques and determine which are useful in identifying a rogue system through software management. (Select all that apply.)
Visual inspection of ports and switches will prevent rogue devices from accessing the network.
Network mapping is an easy way to reveal the use of unauthorized protocols on the network or unusual traffic volume.
Intrusion detection and NAC are security suites and appliances that combine automated network scanning with defense and remediation suites to prevent rogue devices from accessing the network.
Wireless monitoring can reveal whether there are unauthorized access points.
Intrusion detection and NAC are security suites and appliances that combine automated network scanning with defense and remediation suites to prevent rogue devices from accessing the network.
Wireless monitoring can reveal whether there are unauthorized access points.
An attacker tricks a host within a subnet into routing through an attacker’s machine, rather than the legitimate default gateway, allowing the attacker to eavesdrop on communications and perform a Man-in-the-Middle (MitM) attack. Compare the types of routing vulnerabilities and conclude what the attacker is exploiting in this scenario.
Route injection
Denial of service
ARP poisoning
Source routing
ARP poisoning
Which statement regarding attacks on media access control (MAC) addresses accurately pairs the method of protection and what type of attack it guards against? (Select all that apply.)
MAC filtering guards against MAC snooping.
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
MAC filtering guards against MAC spoofing.
DAI guards against invalid MAC addresses
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
DAI guards against invalid MAC addresses
Compare the characteristics of a rogue Access Point (AP) in wireless networks to determine which statements correctly summarize their attributes. (Select all that apply.)
An evil twin is a rogue AP, and an attacker can use a Denial of Service (DoS) to disconnect users from the legitimate AP and connect to the evil twin.
Sometimes referred to as an evil twin, a rogue AP masquerading as a legitimate AP, may have a similar name to a legitimate AP.
An attacker can set up a rogue AP with something as simple as a smartphone with tethering capabilities.
A Denial of Service (DoS) will bypass authentication security (enabled on the AP), so it is important to regularly scan for rogue APs on the network.
An evil twin is a rogue AP, and an attacker can use a Denial of Service (DoS) to disconnect users from the legitimate AP and connect to the evil twin.
Sometimes referred to as an evil twin, a rogue AP masquerading as a legitimate AP, may have a similar name to a legitimate AP.
An attacker can set up a rogue AP with something as simple as a smartphone with tethering capabilities.
A network manager suspects that a wireless network is undergoing a deauthentication attack. Applying knowledge of wireless network attacks, which scenario best supports the network manager’s suspicion?
A. A network experiences radio interference, which causes connectivity issues for users. The users disconnect from the network, and upon reauthenticating, they log on to an evil twin Access Point (AP).
B. An attacker creates an Access Point (AP) using a similar name as a legitimate AP, in an attempt to have users authenticate through the rogue AP in order to gain authentication information.
C. A rogue Access Point (AP) captures user logon attempts. The attacker uses this information to authenticate to the system and obtain critical data.
D. A group of users suddenly disconnects from the network. When the users reconnect, they actually connect to an evil twin Access Point (AP), which gives an attacker information about authentication.
D. A group of users suddenly disconnects from the network. When the users reconnect, they actually connect to an evil twin Access Point (AP), which gives an attacker information about authentication.
A systems administrator is building a wireless network using WPA3 technology. Which of the following would NOT be considered a main feature of WPA3?
Simultaneous authentication of equals
RC4 stream cipher with TKIP
Management protection frames
Enhanced open
RC4 stream cipher with TKIP
A company is reviewing the options for installing a new wireless network. They have requested recommendations for utilizing WEP, WPA, or WPA2. Differentiate between Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Determine which of the following statements accurately distinguishes between the options. (Select all that apply.)
WEP and WPA use RC4 with a Temporal Key Integrity Protocol (TKIP), while WPA2 uses a 24-bit Initialization Vector (IV). WPA2 combines the 24-bit IV with an Advanced Encryption Standard (AES) to add security.
WEP is the strongest encryption scheme, followed by WPA2, then WPA. WEP is difficult to crack when protected by a strong password, or if deploying enterprise authentication. WPA2 is more vulnerable to decryption due to replay attack possibilities.
WPA and WEP use RC4, while WEP uses a 24-bit Initialization Vector (IV). WPA uses a Temporal Key Integrity Protocol (TKIP), and WPA2 uses an Advanced Encryption Standard (AES) for encryption.
WPA2 is the strongest encryption scheme, followed by WPA, then WEP. WPA2 is difficult to crack if protected by a strong password, or if deploying enterprise authentication. WEP is more vulnerable to decryption due to replay attack possibilities.
WPA and WEP use RC4, while WEP uses a 24-bit Initialization Vector (IV). WPA uses a Temporal Key Integrity Protocol (TKIP), and WPA2 uses an Advanced Encryption Standard (AES) for encryption.
WPA2 is the strongest encryption scheme, followed by WPA, then WEP. WPA2 is difficult to crack if protected by a strong password, or if deploying enterprise authentication. WEP is more vulnerable to decryption due to replay attack possibilities.
A hotel guest opens their computer and logs into the Wi-Fi without prompting the guest for a username and password. Upon opening an internet browser, a splash page appears that requests the guest’s room number and last name for authentication. Which type of authentication is the hotel utilizing?
Protected
Extensive
Group
Open
Open
An Internet Service Provider’s (ISP) customer network is under a Distributed Denial of Service (DDoS) attack. The ISP decides to use a blackhole as a remedy. How does the ISP justify their decision?
A blackhole drops packets for the affected IP address(es) and is in a separate area of the network that does not reach any other part of the network.
A blackhole makes the attack less damaging to the ISP’s other customers and continues to send legitimate traffic to the correct destination.
A blackhole routes traffic destined to the affected IP address to a different network. Here, the ISP can analyze and identify the source of the attack, to devise rules to filter it.
A blackhole is preferred, as it evaluates each packet in a multi-gigabit stream against an Access Control List (ACL) without overwhelming the processing resources.
A blackhole drops packets for the affected IP address(es) and is in a separate area of the network that does not reach any other part of the network.
During the planning/scoping phase of the kill chain, an attacker decides that a Distributed Denial of Service (DDoS) attack would be the best way to disrupt the target website and remain anonymous. Evaluate the following explanations to determine the reason the attacker chose a DDoS attack.
A DDoS attack can launch via covert channels
DDoS attacks utilize botnets
A DDoS attack creates a backdoor to a website
DDoS attacks use impersonation
DDoS attacks utilize botnets
Given knowledge of load balancing and clustering techniques, which configuration provides consistent performance and partial fault tolerance for applications like streaming audio and video services?
Active/Passive clustering
Active/Active clustering
First in, First out (FIFO) clustering
Fault tolerant clustering
Active/Passive clustering
Which statement best describes the difference between session affinity and session persistence?
With persistence, once a client device establishes a connection, it remains with the node that first accepted its request, while an application-layer load balancer uses session affinity to keep a client connected by setting up a cookie.
Session affinity makes node scheduling decisions based on health checks and processes incoming requests based on each node’s load. Session persistence makes scheduling decisions on a first in, first out (FIFO) basis.
With session affinity, when a client establishes a session, it remains with the node that first accepted its request, while an application-layer load balancer uses persistence to keep a client connected by setting up a cookie.
Session persistence makes scheduling decisions based on traffic priority and bandwidth considerations, while session affinity makes scheduling decisions based on which node is available next.
With session affinity, when a client establishes a session, it remains with the node that first accepted its request, while an application-layer load balancer uses persistence to keep a client connected by setting up a cookie.
Analyze the following scenarios and determine which best simulates the use of a content filter. (Select all that apply.)
A system has broken down a packet containing malicious content, and erases the suspicious content, before rebuilding the packet.
A high school student is using the school library to do research for an assignment and cannot access certain websites due to the subject matter.
A system administrator builds a set of rules based on information found in the source IP address to allow access to an intranet.
A system administrator blocks access to social media sites after the CEO complains that work performance has decreased due to excessive social media usage at work.
A high school student is using the school library to do research for an assignment and cannot access certain websites due to the subject matter.
A system administrator blocks access to social media sites after the CEO complains that work performance has decreased due to excessive social media usage at work.
Which statement regarding attacks on media access control (MAC) addresses accurately pairs the method of protection and what type of attack it guards against? (Select all that apply.)
MAC filtering guards against MAC snooping.
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
MAC filtering guards against MAC spoofing.
DAI guards against invalid MAC addresses
Dynamic Host Configuration Protocol (DHCP) snooping guards against MAC spoofing.
DAI guards against invalid MAC addresses - Dynamic Address resolution protocol Inspection (DAI)
Note:
DHCP snooping inspects traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address.
DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings.
A networking administrator is reviewing available security products to further fine-tune the existing firewall and appliance settings. An administrator should analyze which system logs in order to tune firewall rulesets and remove or block suspect hosts and processes from the network?
Network-based intrusion detection system (NIDS)
Unified threat management (UTM) product
Network-based intrusion prevention system (IPS)
Network behavior and anomaly detection (NBAD) product
Network-based intrusion detection system (NIDS)
Analyzing NIDS logs allows an administrator to tune firewall rulesets, remove or block suspect hosts and processes from the network, or deploy additional security controls to mitigate any identified threats.
Compare and contrast the characteristics of the various types of firewalls and select the correct explanation of a packet-filtering firewall.
An ACL only allows the minimum amount of traffic required for the operation of valid network services and no more
A firewall that maintains stateful information about the connection between two hosts
A firewall that analyzes HTTP headers and the HTML code to identify code that matches a pattern
A stand-alone firewall implemented with routed interfaces or as a virtual wire transparent firewall
An ACL only allows the minimum amount of traffic required for the operation of valid network services and no more
Which of the following solutions best addresses data availability concerns that may arise with the use of application-aware next-generation firewalls (NGFW) and unified threat management (UTM) solutions?
Signature-based detection system
Secure web gateway (SWG)
Network-based intrusion prevention system (IPS)
Active or passive test access point (TAP)
Secure web gateway (SWG)
While complex NGFW and UTM solutions provide high confidentiality and integrity, lower throughput reduces availability. One solution to this is to treat security solutions for server traffic differently from that for user traffic. An SWG acts as a content filter, which applies user-focused filtering rules and also conducts threat analysis.