Domain 4: Network Security Flashcards
A laptop that is equipped with a fingerprint scanner that authenticates the user is using which of the following types of technology?
A. Pattern recognition
B. Hand geometry
C. Biometrics
D. Tamper detection
C. Biometrics
The technology that uses human physical characteristics to authenticate users is called biometrics. Biometric devices can identify users based on fingerprints, retinal pattern, voice prints, and other characteristics.
An IT department receives a shipment of 20 new computers, and Alice has been assigned the task of preparing them for deployment to end users. The first thing she does is affix a metal tag with a bar code on it to each computer. Which of the following terms best describes the function of this procedure?
A. Asset tracking
B. Tamper detection
C. Device hardening
D. Port security
A. Asset tracking
Bar coding the new computers enables the IT department to record their locations, status, and conditions throughout their life cycle, a process known as asset tracking. Bar codes are not used for tamper detection and device hardening. Port security refers to switches, not computers.
Which of the following types of physical security is most likely to detect an insider threat?
A. Smartcards
B. Motion detection
C. Video surveillance
D. Biometrics
C. Video surveillance
An insider threat by definition originates with an authorized user. Smartcards, motion detection, and biometrics will only detect the presence of someone who is authorized to enter sensitive areas. Video surveillance, however, can track the activities of anyone, authorized or not.
Which of the following physical security mechanisms can either fail close or fail open?
A. Motion detectors
B. Video cameras
C. Honeypots
D. Door locks
D. Door locks
The terms fail close and fail open refer to the default position of an electric or electronic door lock when there is a power failure. Security is often a trade-off with safety, and in the event that an emergency occurs, cutting off power, whether secured doors are permanently locked or left permanently open is a critical factor. The terms fail close and fail open do not apply to motion detectors or video cameras. A honeypot is a computer configured to lure potential attackers; it is not a physical security mechanism.
Which of the following statements describes what it means when the automated lock on the door to a datacenter is configured to fail open?
A. The door remains in its current state in the event of an emergency.
B. The door locks in the event of an emergency.
C. The door unlocks in the event of an emergency.
D. The door continues to function using battery power in the event of an emergency.
C. The door unlocks in the event of an emergency.
A door that is configured to fail open reverts to its unsecured state—open—when an emergency occurs. This must be a carefully considered decision, as it can be a potential security hazard. However, configuring the door to fail closed is a potential safety hazard.
A high security installation that requires entrants to submit to a retinal scan before the door unlocks is using which of the following types of technology?
A. Pattern recognition
B. Hand geometry
C. Biometrics
D. Tamper detection
C. Biometrics
The technology that uses human physical characteristics to authenticate users is called biometrics. Biometric devices can identify users based on fingerprints, retinal pattern, voice prints, and other characteristics.
Which of the following security measures can monitor the specific activities of authorized individuals within sensitive areas?
A. Video surveillance
B. Identification badges
C. Key fobs
D. Motion detection
A. Video surveillance
Video surveillance can monitor all activities of users in a sensitive area. With properly placed equipment, event specific actions, such as commands entered in a computer, can be monitored. Identification badges, key fobs, and motion detection can indicate the presence of individuals in a sensitive area, but they cannot monitor specific activities.
Which of the following statements is true when a biometric authentication procedure results in a false positive?
A. A user who should be authorized is denied access.
B. A user who should not be authorized is denied access.
C. A user who should be authorized is granted access.
D. A user who should not be authorized is granted access.
D. A user who should not be authorized is granted access.
When a false positive occurs during a biometric authentication, a user who should not be granted access to the secured device or location is granted access. A false negative is when a user who should be granted access is denied access.
In the datacenter of a company involved with sensitive government data, all servers have crimped metal tags holding the cases closed. All of the hardware racks are locked in clear-fronted cabinets. All cable runs are installed in transparent conduits. These are all examples of which of the following physical security measures?
A. Tamper detection
B. Asset tracking
C. Geofencing
D. Port security
A. Tamper detection
All of the mechanisms listed are designed to make any attempts to tamper with or physically compromise the hardware devices immediately evident. This is therefore a form of tamper detection. Asset tracking is for locating and identifying hardware. Geofencing is a wireless networking technique for limiting access to a network. Port security refers to network switch ports.
A secured government building that scans the faces of incoming people and compares them to a database of authorized entrants is using which of the following types of technology?
A. Pattern recognition
B. Hand geometry
C. Biometrics
D. Tamper detection
C. Biometrics
The technology that uses human physical characteristics to authenticate users is called biometrics. Biometric devices can identify users based on fingerprints, retinal pattern, voice prints, and other characteristics.
Which of the following is not a means of preventing physical security breaches to a network datacenter?
A. Badges
B. Locks
C. Key fobs
D. Tailgaters
D. Tailgaters
A tailgater is a type of intruder who enters a secure area by closely following an authorized user. Most people are polite enough to hold the door open for the next person without knowing if they are authorized to enter. A tailgater is therefore not an intrusion prevention mechanism. Identification badges, locks, and key fobs are methods of preventing intrusions.
Identification badges, key fobs, and mantraps all fall into which of the following categories of security devices?
A. Physical security
B. Data security
C. Asset tracking
D. Port security
A. Physical security
Identification badges, key fobs, and mantraps are all physical security mechanisms, in that they prevent unauthorized personnel from entering sensitive areas, such as datacenters. These mechanisms are not used for data file security, asset tracking, or switch port security.
Which of the following statements describes what it means when the automated lock on the door to a datacenter is configured to fail closed?
A. The door remains in its current state in the event of an emergency.
B. The door locks in the event of an emergency.
C. The door unlocks in the event of an emergency.
D. The door continues to function using battery power in the event of an emergenc
B. The door locks in the event of an emergency.
A door that is configured to fail closed reverts to its secured state—locked—when an emergency occurs. This must be a carefully considered decision, since it can be a potential safety hazard. However, configuring the door to fail open is a potential security hazard.
Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?
A. 802.11ac
B. 802.11n
C. 802.1X
D. 802.3x
C. 802.1X
IEEE 802.1X is a standard that defines a port-based Network Access Control mechanism used for authentication on wireless and other networks. IEEE 802.11ac and 802.11n are standards defining the physical and data link layer protocols for wireless networks. IEEE 802.3x is one of the standards for wired Ethernet networks.
In a public key infrastructure (PKI), which half of a cryptographic key pair is never transmitted over the network?
A. The public key
B. The private key
C. The session key
D. The ticket granting key
B. The private key
In a PKI, the two halves of a cryptographic key pair are the public key and the private key. The public key is freely available to anyone, but the private key is never transmitted over the network.
Which of the following authentication protocols do Windows networks use for Active Directory Domain Services authentication of internal clients?
A. RADIUS
B. WPA2
C. Kerberos
D. EAP-TLS
C. Kerberos
Windows networks that use AD DS authenticate clients using the Kerberos protocol, in part because it never transmits passwords over the network, even in encrypted form. RADIUS is an authentication, authorization, and accounting service for remote users connecting to a network. Windows does not use it for internal clients. WPA2 is a security protocol used by wireless LAN networks. It is not used for AD DS authentication. EAP-TLS is a remote authentication protocol that AD DS networks do not use for internal clients.
Which of the following statements best describes asymmetric key encryption?
A. A cryptographic security mechanism that uses the same key for both encryption and decryption
B. A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
C. A cryptographic security mechanism that uses two separate sets of public and private keys to encrypt and decrypt data
D. A cryptographic security mechanism that uses separate private keys to encrypt and decrypt data
B. A cryptographic security mechanism that uses public and private keys to encrypt and decrypt data
Asymmetric key encryption uses public and private keys. Data encrypted with the public key can only be decrypted using the private key. The reverse is also true. Symmetric key encryption uses only one key both to encrypt and decrypt data. Security mechanisms that use multiple key sets are not defined as symmetric.
Which of the following protocols can you use to authenticate Windows remote access users with smartcards?
A. EAP
B. MS-CHAPv2
C. CHAP
D. PAP
A. EAP
The Extensible Authentication Protocol (EAP) is the only Windows remote authentication protocol that supports the use of authentication methods other than passwords, such as smartcards. MS-CHAPv2 is a strong remote access authentication protocol, but it supports password authentication only. Users cannot use smartcards. The Challenge Handshake Authentication Protocol (CHAP) is a relatively weak authentication protocol that does not support the use of smartcards. The Password Authentication Protocol (PAP) supports only clear text passwords, not smartcards.
Which of the following statements best defines multifactor user authentication?
A. Verification of a user’s identity on all of a network’s resources using a single sign-on
B. Verification of a user’s identity using two or more types of credentials
C. Verification of a user’s identity on two devices at once
D. Verification of a user’s membership in two or more security groups
B. Verification of a user’s identity using two or more types of credentials
Multifactor authentication combines two or more authentication methods, requiring a user to supply multiple credentials. This reduces the likelihood that an intruder would be able to successfully impersonate a user during the authentication process. The term multifactor does not refer to the number of resources, devices, or groups with which the user is associated.
How many keys does a system that employs asymmetric encryption use?
A. None. Asymmetric encryption doesn’t require keys.
B. One. Asymmetric encryption uses one key for both encryption and decryption.
C. Two. Asymmetric encryption uses one key for encryption and another key for decryption.
D. Three. Asymmetric encryption requires a separate authentication server, and each system has its own key.
C. Two. Asymmetric encryption uses one key for encryption and another key for decryption.
Asymmetric encryption uses two separate keys, one for encryption and one for decryption. In a public key infrastructure (PKI), each user, computer, or service has both a public key and a private key.
How many keys does a system that employs symmetric encryption use?
A. None. Symmetric encryption doesn’t require keys.
B. One. Symmetric encryption uses one key for both encryption and decryption.
C. Two. Symmetric encryption uses one key for encryption and another key for decryption.
D. Three. Symmetric encryption requires a separate authentication server, and each system has its own key.
B. One. Symmetric encryption uses one key for both encryption and decryption.
Symmetric encryption uses one key, which the systems use for both encryption and decryption.
When a user supplies a password to log on to a server, which of the following actions is the user performing?
A. Authentication
B. Authorization
C. Accounting
D. Auditing
A. Authentication
Authentication is the process of confirming a user’s identity. Passwords are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected.
When a user swipes a finger across a fingerprint scanner log on to a laptop computer, which of the following actions is the user performing?
A. Authentication
B. Authorization
C. Accounting
D. Auditing
A. Authentication
Authentication is the process of confirming a user’s identity. Fingerprints and other biometric readers are one of the authentication factors commonly used by network devices. Authorization defines the type of access granted to authenticated users. Accounting and auditing are both methods of tracking and recording a user’s activities on a network, such as when a user logged on and how long they remained connected.
Which of the following security protocols can authenticate users without transmitting their passwords over the network?
A. Kerberos
B. 802.1X
C. TKIP
D. LDAP
A. Kerberos
Kerberos is a security protocol used by Active Directory that employs a system of tickets to authenticate users and other network entities without the need to transmit credentials over the network. IEEE 802.1X does authenticate by transmitting credentials. Temporal Key Integrity Protocol (TKIP) and Lightweight Directory Access Protocol (LDAP) are not authentication protocols.