Module 12 - Network Security Infrastructure Flashcards

1
Q

What is the purpose of a personal firewall on a computer?

To increase the speed of the Internet connection
To protect the computer from viruses and malware
To filter the traffic that is moving in and out of the PC
To protect the hardware against fire hazard

A

To filter the traffic that is moving in and out of the PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between the implementation of IDS and IPS devices?

An IDS can negatively impact the packet flow, whereas an IPS can not.
An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall.
An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology.
An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately

A

An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

Device Type
Cable Specification
Interface Identifier
Cable Type and Identifier
OS/IOS Version
Connection Type

A

Interface identifier
Connection Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a characteristic of a WAN?

It is typically owned and managed by a single home or business.
It requires a wireless access point to connect users to the network.
It spans across a campus or city to enable sharing of regional resources.
It connects multiple networks that are geographically separated.

A

It spans across a campus or city to enable sharing of regional resources.

It is called a WAN (wide-area network) because it spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.

For example, businesses with many international branch offices use a WAN to connect office networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device?

NetFlow
Network tap
Port Mirroring
SNMP

A

Port Mirroring

When enabled on a switch, port mirroring copies frames sent and received by the switch and forwards them to another port, which has a analysis device attached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a function of a proxy firewall?

Drops or forwards traffic based on packet header information
Connects to remote servers on behalf of clients
Filters IP traffic between bridged interfaces
Uses signatures to detect patterns in network traffic

A

Connects to remote servers on behalf of clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats?

Threat Intelligence
Network Admission Control
Website Filtering and Block Listing
Network Profiling

A

Threat Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is a source IP address used in a standard ACL?

It is the criterion that is used to filter traffic.

It is the address that is unknown, so the ACL must be placed on the interface closest to the source address.

It is the address to be used by a router to determine the best path to forward packets.

It is used to determine the default gateway of the router that has the ACL applied.

A

It is the criterion that is used to filter traffic.

The only filter that can be applied with a standard ACL is the source IP address. An extended ACL is used to filter on such traffic as the source IP address, destination IP address, type of traffic, and type of message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. The network “A” contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as “A”?

Untrusted Network
Perimeter Security Boundary
Internal Network
DMZ

A

A demilitarized zone or DMZ is a network area protected by one or more firewalls. The DMZ typically contains servers that are commonly accessed by external users. A web server is commonly contained in a DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which statement describes the Cisco Cloud Web Security?

It is a security appliance that provides an all-in-one solution for securing and controlling web traffic.
It is an advanced firewall solution to guard web servers against security threats.
It is a cloud-based security service to scan traffic for malware and policy enforcement.
It is a secure web server specifically designed for cloud computing.

A

It is a cloud-based security service to scan traffic for malware and policy enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which network service allows administrators to monitor and manage network devices?

SNMP
Syslog
NTP
NetFlow

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a feature of the TACACS+ protocol?

It hides passwords during transmission using PAP and sends the rest of the packet in plaintext.
It utilizes UDP to provide more efficient packet transfer.
It combines authentication and authorization as one process.
It encrypts the entire body of the packet for more secure communications.

A

It encrypts the entire body of the packet for more secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which layer of the hierarchical design model is a control boundary between the other layers?

Core
Access
Distribution
Network

A

Distribution

The three design layers from lowest to highest are access, distribution, and core. The distribution layer commonly provides policy-based connectivity which permits or denies traffic based on predefined parameters.

The distribution layer also acts as a control boundary between the access and core layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

MD5
ESP
AES
IPsec

A

IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement describes a difference between RADIUS and TACACS+?

RADIUS separates authentication and authorization whereas TACACS+ combines them as one process.

RADIUS encrypts only the password whereas TACACS+ encrypts all communication.

RADIUS is supported by the Cisco Secure ACS software whereas TACACS+ is not.

RADIUS uses TCP whereas TACACS+ uses UDP.

A

RADIUS encrypts only the password whereas TACACS+ encrypts all communication.*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two disadvantages of using an IDS? (Choose two.)

The IDS requires other devices to respond to attacks.
The IDS works offline using copies of network traffic.
The IDS has no impact on traffic.
The IDS does not stop malicious traffic.
The IDS analyzes actual forwarded packets.

A

The IDS does not stop malicious traffic

The IDS requires other devices to respond to attacks.*

17
Q

What two components of traditional web security appliances are examples of functions integrated into a Cisco Web Security Appliance? (Choose two.)

URL filtering
Email virus and spam filtering
VPN connection
Web reporting
Firewall

A

Web reporting
URL filtering

18
Q

What’s a characteristic of a hub?

Operates at Layer 2

Subdivides the network into collision domains

It regenerates the signal and retransmits on all ports

Uses CSMA/CA to avoid collisions

A

It regenerates the signal and retransmits on all ports

19
Q

Which AAA Component Can Be Established Using Token Cards?

Authentication

Accounting

Authorization

Auditing

A

Authentication

20
Q

What is a host-based intrusion detection system (HIDS)?

It detects and stops potential direct attacks but does not scan for malware.

It combines the functionalities of antimalware applications with firewall protection.

It is an agentless system that scans files on a host for potential malware.

It identifies potential attacks and sends alerts but does not stop the traffic.

A

It combines the functionalities of antimalware applications with firewall protection

21
Q

What is an advantage of HIPS that is not provided by IDS?

HIPS deploys sensors at network entry points and protects critical network segments.

HIPS protects critical system resources and monitors operating system processes.

HIPS monitors network processes and protects critical files.

HIPS provides quick analysis of events through detailed logging.

A

HIPS protects critical system resources and monitors operating system processes.

22
Q

Which Technique Is Necessary To Ensure A Private Transfer Of Data Using A VPN?

Scalability

Virtualization

Encryption

Authorization

A

Encryption

23
Q

Match the network security device type with the description.

A

Packet Filter Firewall > Enforces access control policy based on packet content

Intrusion Prevention System (IPS) > Uses signatures to detect patterns in network traffic.

Application Gateway > Filters traffic on Layer 7 information.

Stateful Firewall > Filters traffic based on defined rules as well as connection context.