Module 17 - Hardening Host Network Services - Q&A Flashcards

1
Q

Which of the following statements is true regarding TCP/ IP? (Choose two.)
A. TCP/ IP protocols are part of the OSI model.
B. TCP/ IP is a protocol stack containing multiple protocols.
C. TCP/ IP closely maps to the OSI model.
D. TCP/ IP protocols are part of the transport and network layers of the OSI model.

A

B, C. TCP/ IP is a protocol suite that has multiple protocols in it, and it closely maps to the OSI model layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is an important security issue with IPv4?
A. Use of NAT to conserve IP addresses
B. Lack of interoperability with IPsec
C. Lack of built-in authentication and encryption services
D. Use of 32-bit addresses

A

C. The lack of built-in authentication and encryption services is an important security issue with IPv4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a true statement regarding IPv6?
A. IPv6 requires the use of NAT to help conserve IP addresses.
B. It has been implemented on the Internet worldwide.
C. It has 4,294,967,296 available IP addresses.
D. IPsec is natively included with IPv6.

A

D. IPsec is natively included with IPv6.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your manager wants you to investigate possible security issues with your network devices. You discover that your network devices are all running an older version of the SNMP protocol. Which of the following best describes weaknesses associated with older versions of SNMP? (Choose two.)
A. Default community strings of “public” and “private”
B. Weak mutual authentication between devices
C. Lack of encrypted community strings
D. Use of weak DES encryption algorithm

A

A, C. Older versions of the SNMP protocol suffer from a lack of any encryption, as well as weak default community strings that are frequently not changed by administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
All of the following protocols provide for secure communications, except:
A. SSH
B. SCP
C. IPsec
D. Telnet
A

D. Telnet does not provide for secure communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is an older Microsoft-proprietary application programming interface used to allow applications to communicate with each other over local area networks?
A. IPsec
B. NetBIOS
C. RDP
D. SSH
A

B. NetBIOS is an older Microsoft-proprietary application programming interface used to allow applications to communicate with each other over local area networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following protocols uses TCP port 3389?
A. Remote Desktop Protocol
B. Secure Shell
C. IPsec
D. NetBIOS over TCP/ IP (NBT)
A

A. Remote Desktop Protocol (RDP) is a Microsoft-proprietary protocol that uses TCP port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following IPsec protocols is used to provide authentication and integrity for an entire IP packet?
A. Encapsulating Security Payload (ESP)
B. Authentication Header protocol (AH)
C. Internet Key Exchange (IKE)
D. Internet Security Association and Key Management Protocol (ISAKMP)

A

B. The Authentication Header (AH) protocol is used to provide authentication and integrity for an entire IP packet, regardless of whether it is in transport mode or tunnel mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following IPsec modes should be used within a local area network?
A. Authentication mode
B. Tunnel mode
C. Transport mode
D. Encryption mode
A

C. Transport mode should be used within a local area network, since the IP header can’t be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following types of attacks can be carried out by ICMP?
A. Brute-force attack
B. Denial-of-service attack
C. Man-in-the-middle attack
D. Injection attack
A

B. A denial-of-service attack can be carried out by ICMP, using either oversized ICMP packets or massive amounts of ICMP packets sent to a particular host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly