Network Security Flashcards

1
Q

What purpose does an IT-based honeypot provide?
Instruction: Choose the option that best answers the question.
Answer Choices

IT system decoy to require user MFA

IT system decoy to track hacker activity

IT system decoy to require user SSO

IT system decoy to protect production data

A

IT system decoy to track hacker activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of VMware workstation network does not allow communication with other networks?
Instruction: Choose the option that best answers the question.
Answer Choices

NAT

Host-only

Isolated

Bridged

A

Host-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have configured DNSSEC for a Windows Server DNS zone. What must you do to put DNSSEC into effect for clients?
Instruction: Choose the option that best answers the question.
Answer Choices

Run gpuudate/force

Configure the Name Resolution Policy

Install client PKI certificates on the server

Install a PKI certificate on each client

A

Configure the Name Resolution Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have configured a honeypot listening on TCP port 25. From another station, which tool can you use to run a port scan to trigger honeypot alerts?
Instruction: Choose the option that best answers the question.
Answer Choices

nmap

ping

ssh

traceroute

A

nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which DNS security option assures DNS clients of DNS response validity?
Instruction: Choose the option that best answers the question.
Answer Choices

MFA

PKI

DNSSEC

IPsec

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a layer 3 switch differ from a layer 2 switch?
Instruction: Choose the option that best answers the question.
Answer Choices

Layer 3 switches can route between VLANS

Layer 2 switches can route between VLANs

Layer 2 switches support MFA

Layer 3 switches support MFA

A

Layer 3 switches can route between VLANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which OSI layer do TCP port numbers apply to?
Instruction: Choose the option that best answers the question.
Answer Choices

Layer 5, session

Layer 2, data link

Layer 3, network

Layer 4, transport

A

Layer 3, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Wi-Fi network connectivity method involves scanning in a QR code?
Instruction: Choose the option that best answers the question.
Answer Choices

Wi-Fi Easy Connect

WPA2

WEP

WPA3

A

Wi-Fi Easy Connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are viewing a Wireshark packet capture. To which OSI model layer does the IP header correspond to?
Instruction: Choose the option that best answers the question.
Answer Choices

2

3

1

4

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly