Implementation Flashcards
You are installing a new wireless network in your office building and want to ensure it is secure. Which of the following configurations would create the MOST secure wireless network?
WPA2 and RC4
WEP and TKIP
WPA and MAC filtering
WPA2 and AES
WPA2 and AES
Your company has an office in Boston and is worried that its employees may not reach the office during periods of heavy snowfall. You have been asked to select a technology that would allow employees to work remotely from their homes during poor weather conditions. Which of the following should you select?
VPN
IDS
VLAN
NAT
VPN
A firewall administrator has configured a new DMZ to allow public systems to be segmented from the organization’s internal network. The firewall now has three security zones set: Untrusted (Internet) [143.27.43.0/24]; DMZ (DMZ) [161.212.71.0/24]; Trusted (Intranet) [10.10.0.0/24]. The firewall administrator has been asked to enable remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ for the Chief Security Officer to work from his home office after hours. The CSO’s home internet uses a static IP of 143.27.43.32. The remote desktop server is assigned a public-facing IP of 161.212.71.14. What rule should the administrator add to the firewall?
Permit 143.27.43.32 161.212.71.14 RDP 3389
Permit 143.27.43.32 161.212.71.0/24 RDP 3389
Permit 143.27.43.0/24 161.212.71.0/24 RDP 3389
Permit 143.27.43.0/24 161.212.71.14 RDP 3389
Permit 143.27.43.32 161.212.71.14 RDP 3389
You want to provide controlled remote access to the remote administration interfaces of multiple servers hosted on a private cloud. What type of segmentation security solution is the best choice for this scenario?
Bastion hosts
Physical
Jumpbox
Airgap
Jumpbox
Which of the following ports should you block at the firewall if you want to prevent a remote login to a server from occurring?
110
23
443
25
23
Which of the following is the LEAST secure wireless security and encryption protocol?
WPA2
WPA
AES
WEP
WEP
Which of the following secure coding best practices ensures special characters like , /, and ‘ are not accepted from the user via a web form?
Session management
Input validation
Output encoding
Error handling
Input validation
Why would a company want to utilize a wildcard certificate for their servers?
To increase the certificate’s encryption key length
To extend the renewal date of the certificate
To reduce the certificate management burden
To secure the certificate’s private key
To reduce the certificate management burden
Your company just installed a new webserver within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?
80
443
21
143
443 (HTTPS)
You received an incident response report indicating a piece of malware was introduced into the company’s network through a remote workstation connected to the company’s servers over a VPN connection. Which of the following controls should be applied to prevent this type of incident from occurring again?
SPF
MAC filtering
NAC
ACL
NAC
You are conducting an incident response and have traced the attack source to some compromised user credentials. After performing log analysis, you discover that the attack was successfully authenticated from an unauthorized foreign country. Your management is now asking for you to implement a solution to help mitigate this type of attack from occurring again. Which of the following should you implement?
Context-based authentication
Single sign-on
Password complexity
Self-service password reset
Context-based authentication
The Pass Certs Fast corporation has recently been embarrassed by several high profile data breaches. The CIO proposes improving the company’s cybersecurity posture by migrating images of all the current servers and infrastructure into a cloud-based environment. What, if any, is the flaw in moving forward with this approach?
This approach assumes that the cloud will provide better security than is currently done on-site
This approach only changes the location of the network and not the attack surface of it
This is a reasonable approach that will increase the security of the servers and infrastructure
The company has already paid for the physical servers and will not fully realize their ROI on them due to the migration
This approach only changes the location of the network and not the attack surface of it
The management at Steven’s work is concerned about rogue devices being attached to the network. Which of the following solutions would quickly provide the most accurate information that Steve could use to identify rogue devices on a wired network?
A physical survey
A discovery scan using a port scanner
Reviewing a central administration tool like a SCCM
Router and switch-based MAC address reporting
Router and switch-based MAC address reporting
You are configuring the ACL for the network perimeter firewall. You have just finished adding all the proper allow and deny rules. What should you place at the end of your ACL rules?
A time of day restriction
A SNMP deny string
An implicit deny statement
An implicit allow statement
An implicit deny statement
Which authentication mechanism does 802.1x usually rely upon?
HOTP
RSA
EAP
TOTP
EAP
Extensible Authentication Protocol - A framework of protocols that allows for numerous methods of authentication including passwords, digital certificates, and public key
infrastructure
You are reviewing a rule within your organization’s IDS. You see the following output:-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET anymsg: “BROWSER-IE Microsoft Internet ExplorerCacheSize exploit attempt”;flow: to_client,established; file_data; content:”recordset”; offset:14; depth:9; content:”.CacheSize”; distance:0; within:100; pcre:”/CacheSize\s=\s/”; byte_test:10,>,0x3ffffffe,0,relative,string; max-detect-ips drop, service http; reference:cve,2016-8077; classtype: attempted-user; sid:65535;rev:1; -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Based on this rule, which of the following malicious packets would this IDS alert on?
Any malicious outbound packets
An malicious inbound TCP packet
Any malicious inbound packets
An malicious outbound TCP packet
In an effort to improve the security of the Dion Training corporate network, a security administrator wants to update the configuration of their wireless network to have IPSec built into the protocol by default. Additionally, the security administrator would like for NAT to no longer be required for extending the number of IP addresses available. What protocol should the administrator implement on the wireless network to achieve their goals?
IPv4
IPv6
WEP
WPA2
IPv6
Which of the following protocols is commonly used to collect information about CPU utilization and memory usage from network devices?
SNMP
MIB
NetFlow
SMTP
MIB (Management Information Base)
Which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself?
Advanced anti-malware
Startup Control
Measured boot
Master Boot Record analytics
Measured boot
A new security appliance was installed on a network as part of a managed service deployment. The vendor is who controls the appliance, and the IT team is not able to log in or configure it. The IT team is concerned about the appliance receiving necessary updates. Which of the following mitigations should be performed to minimize the concern for the appliance and updates?
Vulnerability scanning
Automatic updates
Scan and patch the device
Configuration management
Vulnerability scanning
Which of the following technologies is NOT a shared authentication protocol?
Facebook Connect
OpenID Connect
LDAP
OAuth
LDAP
You need to determine the best way to test operating system patches in a lab environment prior to deploying them to your automated patch management system. Unfortunately, your network has several different operating systems in use, but you only have one machine available to test the patches on. What is the best environment to utilize to perform the testing of the patches prior to deployment?
Virtualization
Bypass testing and deploy patches directly into the production environment
Sandboxing
Purchase additional workstations
Virtualization
You suspect that your server has been the victim of a web-based attack. Which of the following ports would most likely be seen in the logs to indicate the target of the attack?
443
389
3389
21
443
Which of the following access control methods provides the most detailed and explicit type of access control over a resource?
DAC
MAC
ABAC
RBAC
ABAC