Network Attack Mitigation Flashcards

1
Q

To which types of Azure resources can network security groups be associated with?
Instruction: Choose all options that best answer the question.
Answer Choices

Vnets

Virtual machines

Subnets

Network interfaces

A

Subnets
Network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Your organization uses Microsoft Active Directory with domain-joined computers. You need to deploy the same Windows Defender inbound rules to a subset of those computers. What should you do?
Instruction: Choose the option that best answers the question.
Answer Choices

Configure the rules on each computer

Configure a GPO targeting the appropriate computers, create inbound rules in the GPO

Configure the rules on one computer, export them, then import them to the remaining computers

Create a PowerShell script to create the rules; run the script on each computer

A

Configure a GPO targeting the appropriate computers, create inbound rules in the GPO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which snort command starts the snort engine on Linux?
Instruction: Choose the option that best answers the question.
Answer Choices

snort -T console -i eth0

snort -A console -i eth0

snort -T console -I eth0 /etc/snort/snort.conf

snort -A console -i eth0 -c /etc/snort/snort.conf

A

snort -A console -i eth0 -c /etc/snort/snort.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of firewall works up to layer 4 of the OSI model?
Instruction: Choose the option that best answers the question.
Answer Choices

Packet filtering

Content filtering

Reverse proxy

Forward proxy

A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which additional feature does an IPS provide over an IDS?
Instruction: Choose the option that best answers the question.
Answer Choices

Enhanced security rule configuration

Ability to send alerts when suspicious activity is detected

Ability to log suspicious activity

Ability to stock attacks in progress

A

Ability to stock attacks in progress

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of Azure Firewall rule allows access to a DNS name?
Instruction: Choose the option that best answers the question.
Answer Choices

NAT

Application

Proxy

Network

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which are commonly used to configure firewall rules on Linux hosts?
Instruction: Choose all options that best answer the question.
Answer Choices

iptables

ipconfig

ifconfig

ufw

A

iptables
ufw

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is reverse proxying similar in concept to?
Instruction: Choose the option that best answers the question.
Answer Choices

Load balancing

Packet filtering

IPSec

Port forwarding

A

Load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly