Lesson 9 Review Questions Flashcards

(13 cards)

1
Q

A coworking office wants to upgrade its Wi-Fi encryption to Wi-Fi Protected Access 3 (WPA3). Which feature of WPA3 replaces the pre-shared key (PSK) exchange protocol in WPA2 to ensure an attacker cannot intercept the Wi-Fi password even when capturing data from a successful login?

A. Wi-Fi Easy Connect (DPP)

B. Enhanced Open

C. Updated cryptographic protocols

D. Simultaneous authentication of equals (SAE)

A

D. Simultaneous authentication of equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization decides to revamp its cloud infrastructure. The IT manager instructs the team to initiate the process by ensuring the starting configurations for all systems adhere to specific security settings. This effort aims to create a foundation that facilitates the consistent application of security techniques across all systems. When the IT team works on the organization’s cloud infrastructure to establish a foundation for consistent security techniques, which approach BEST reflects using secure baselines?

A. Implementing encryption for Data-at-Rest

B. Establishing standardized configurations for devices and software

C. Enforcing password complexity requirements

D. Setting up a virtual private network (VPN) for remote access

A

B. Establishing standardized configurations for devices and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security administrator reviews the network configurations of a recently deployed server. The administrator notices that certain unnecessary services have access to the server, potentially creating vulnerabilities. The administrator decides to refine the access control list (ACL) to enhance the server’s security. Which action will the security administrator MOST likely take when refining the ACL to ensure that only necessary services communicate with the server, thereby reducing potential attack vectors?

A. Permit all incoming traffic to maintain functionality

B. Deny all traffic and allow exceptions based on requirement

C. Permit traffic only from trusted MAC addresses

D. Implement a stateful firewall for the server

A

B. Deny all traffic and allow exceptions based on requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company’s IT security specialist decides to upgrade the wireless network infrastructure to enhance data protection during transmissions. Recognizing the importance of strong encryption for wireless data, the specialist evaluates the various encryption standards available. Which wireless encryption standard offers the MOST robust security for protecting wireless data transmissions and has become the preferred choice for many organizations?

A. Wi-Fi Protected Access 3

B. Wired Equivalent Privacy

C. Wi-Fi Protected Access

D. Temporal Key Integrity Protocol

A

A. Wi-Fi Protected Access 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A large organization faces increasing threats from unauthorized devices trying to gain access to its network. The chief information security officer (CISO) seeks to modify the company’s network infrastructure to incorporate a more rigorous method of validating both users and devices before granting access to resources. Which network access control method should the CISO implement to ensure rigorous validation of both users and devices, offering the highest level of security against unauthorized access to the company’s network resources?

A. 802.1X

B. Media Access Control address filtering

C. Virtual Private Network concentrator

D. Stateless firewall

A

A. 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A multinational corporation has hired a lead IT consultant to assess the security of its various systems, including Windows and Linux servers, desktops, and mobile devices in different countries. To ensure consistent security across all these systems, which of the following tools would the consultant recommend the organization use to automate the deployment of secure baseline configurations?

A. Center for Internet Security Configuration Assessment Tool (CIS-CAT) Pro

B. Security Content Automation Protocol (SCAP)

C. Puppet

D. Security Technical Implementation Guides (STIGs)

A

C. Puppet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A medium-sized enterprise is revamping its wireless network infrastructure to improve security. The IT manager decided to update the company’s Wi-Fi authentication method as the first step. The main objective is to have a solution that ensures the identity of the connecting devices while also providing an additional layer of security for user authentication. Which Wi-Fi authentication method BEST fits the IT manager’s requirement to validate device identity and robust user authentication for the company’s wireless network infrastructure?

A. Wi-Fi Protected Access 3-Pre-shared Key

B. Open System Authentication

C. Wi-Fi Protected Access 3-Enterprise

D. Wired Equivalent Privacy

A

C. Wi-Fi Protected Access 3-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security administrator plans to enhance the security posture of an organization’s computing infrastructure. The administrator starts by documenting the current state of all system configurations and intends to establish a foundation to enforce security standards. Given the scenario, which security technique is the security administrator preparing to implement that ensures consistent application of security configurations across all systems in the organization?

A. Secure baselines

B. Patch management

C. Multifactor authentication (MFA)

D. Intrusion detection system (IDS)

A

A. Secure baselines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following methods is a replacement for Wi-Fi Protected Setup (WPS) as a more secure means of configuring client devices with the necessary information to access a Wi-Fi network?

A. Device Provisioning Protocol (DPP)

B. Wi-Fi Protected Access 3 (WPA3)

C. Enhanced Open

D. Simultaneous Authentication of Equals (SAE)

A

A. Device Provisioning Protocol (DPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A healthcare organization has tasked a new security lead to improve its data protection strategy. The organization is heavily dependent on medical devices, electronic health records, and communication systems that are all interconnected. How can the security lead reason with the executive leadership team to implement secure baselines for network devices, software, and other components to the executive leadership team?

A. It enhances IT security and operational efficiencies.

B. It reduces the need for logging and monitoring.

C. It simplifies the process of patching and updates.

D. It promotes the use of default configurations.

A

A. It enhances IT security and operational efficiencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The network administrator for a large corporation recently detected multiple unauthorized intrusion attempts on the network. As a result, the team deployed an intrusion detection system (IDS) and an intrusion prevention system (IPS). The team aims to block malicious traffic and automatically receive alerts on suspicious activities. The administrator needs to choose an approach that offers real-time protection against active threats and can modify or reject traffic in the network. Based on the desired outcomes and functionality the network administrator requires, which system should the team primarily focus on for real-time traffic modification and blocking active threats?

A. Intrusion Detection System (IDS)

B. Intrusion Prevention System (IPS)

C. Network-based Intrusion Detection System (NIDS)

D. Host-based Intrusion Detection System (HIDS)

A

B. Intrusion Prevention System (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A newly-hired cybersecurity manager of a software company evaluates the available intrusion detection and intrusion prevention capabilities of the company. What method detects changes in normal “baseline” operating data sequences and identifies abnormal sequences?

A. Signature-based detection

B. Behavioral-based detection

C. Network behavior and anomaly detection

D. Network traffic analysis

A

B. Behavioral-based detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following practices is critical for device hardening by providing a standard set of guidelines or checklists for configuring devices securely?

A. Regular maintenance cycle

B. User awareness training

C. Least functionality principle

D. Monitoring and encryption

A

C. Least functionality principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly