Network Security Flashcards

Get Net+ Certified (27 cards)

1
Q

Which technology will an organization MOST likely deploy to manage industrial machinery?

A. SCADA
B. SNMP
C. SIP
D. SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which policy sets guidelines for allowing employees to use their own personal devices for work-related tasks?

A. BYOD
B. AUP
C. NDA
D. SLA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of vulnerability would NOT be reported by a vulnerability scan?

A. Missing passwords
B. Configuration errors
C. Missing patches
D. Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an example of valid multifactor authentication factors?

A. Smare card and proximity tag
B. Facial recognition and PIN
C. PIN and password
D. Thumb print and retinal scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company wants to implement an authentication and authorization solution for network devices that also directly supports device management.
What should the company use?

A. SNMP
B. Kerberos
C. TACACS+
D. RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should a company use as an authentication and authorization server for WPA2-Enterprise?

A. RADIUS
B. TACACS+
C. LDAP
D. Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is an open, vendor-neutral standard protocol for accessing and maintaining directory services?

A. IMAP
B. SNMP
C. SMTP
D. LDAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify whether each statement describes an exploit or a vulnerability.

  1. An application has an open maintenance hook that provides access to configuration settings.
  2. A database server’s operating system is missing several security patches.
  3. Deceptive calls are used to gather critical information about network servers.
  4. User login accounts have administrative rights to client computers.
  5. A data breach exposes personal information about customers.
A
  1. An application has an open maintenance hook that provides access to configuration settings. = VULNERABILITY
  2. A database server’s operating system is missing several security patches. = VULNERABILITY
  3. Deceptive calls are used to gather critical information about network servers. = EXPLOIT
  4. User login accounts have administrative rights to client computers. = VULNERABILITY
  5. A data breach exposes personal information about customers. = EXPLOIT

Penetration Testing Terminology
What Are The Different Types Of Penetration Testing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which statement describes a primary benefit provided by multifacotr authentication?

A. Required use of biometrics
B. Protection of data in motion
C. Mitigation of phishing attacks
D. Federated authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company recently implemented a bring your own device (BYOD) policy and is adding security controls over personal devices. The company wants to ensure that some managed apps and most company data will be unavailable when a device leaves the corporate campus.

What should the company use to implement this?

A. WPA2
B. Geotagging
C. EAP-FAST
D. Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company needs to have a reliable record of everyone who enters or leaves a locked area of the building.
What should the company use?

A. Biometric lock
B. Video surveillance
C. Sign-in log
D. Motion detector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker posing as a janitor manages to access a storage cabinet where sensitive printed documents are kept. Which physical preventative control should the organization implement to address this risk?

A. install alarms on all doors leading to the storage cabinet.
B. Install a locked cabinet that limits access to the documents.
C. Install surveillance cameras throughout the storage area.
D. Define a policy that forbids unauthorized access to the cabinet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attacker steals backup tapes from a datacenter. Which is the BEST option for detecting such physical breaches?

A. Biometrics
B. Badge readers
C. Cameras
D. Access control vestibule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Against which type of attack is end user training most effective?

A. War driving
B. Man-in-the-middle
C. Evil twin
D. Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A malware attack encrypts the data on a critical network server. A dialog box displays on the server display screen with instructions about how to pay for a recovery code to decrypt the server data.
Which type of attack does this scenario describe?

A. Deauthentication
B. Man-in-the-middle
C. Ransomware
D. Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of attack is designed to flood a server with traffic, either crashing the server or making it unavailable?

A. Brute Force
B. DoS
C. Ransomware
D. Logic bomb

17
Q

Which two attack types are examples of social engineering attacks? (Choose two.)

A. Spoofing
B. Tailgating
C. Man-in-the-middle
D. Logic bomb
E. Phishing

18
Q

A NIDS reports several attempts to download files from an external IP address. The Technical Services department determines that the source is a website that is made to look like a site from which network users download reference materials and blank PDF forms. Users enter the correct URL for the website but are being sent to a different IP address.
Which type of attack is this?

A. DNS poisoning
B. Evil twin
C. VLAN hopping
D. ARP poisoning

19
Q

A network administrator would change the ID on a switch’s native VLAN to mitigate what type of attack?

A. Rogue trunking
B. VLAN hopping
C. DDoS
D. ARP attack

20
Q

A user reports odd behavior when attempting to access network resources from their Windows laptop. While reviewing the laptop’s configuration, a network technician discovers that the hosts file has been modified. Which type of attack has the security administrator likely uncovered?

A. DNS poisoning
B. On-path attack
C. Domain hijacking
D. MAC spoofing

A

A. DNS poisoning

Poisoning Your Hosts File — A Guide
Layer 2 Attacks – MAC Address Spoofing Attacks
What is Domain Hijacking?
[What is an on-path attacker?]https://www.cloudflare.com/learning/security/threats/on-path-attack/)

21
Q

A network technician is concerned about the risk of tailgating in their environment. What should the technician do to mitigate the risk?

A. Implement an access control vestibule
B. Implement a shredding policy
C. Implement a data lifecycle policy
D. Implement multifactor authentication (MFA)

22
Q

Match network devices with their role in 802.1x port-based authentication.
To answer, match the appropriate 802.1x role to each network device. A role may be used once, more than once, or not at all.

23
Q

A technician configures an access point as shown in the exhibit. He creates a list of MAC addresses to allow on the network using MAC filtering. The technician realizes that despite this configuration, any device can still connect. What should the technician do?

A. Change the order of IDs.
B. Enable MAC filtering globally.
C. Change the method to Blacklisting.
D. Reboot the access point.

24
Q

A server on the internal network is determined to be at risk for potential attack. The Technical Services team is directed to harden the server to minimize this risk. The network supports wired and wireless access. The server is connected through a wired connection.
The computer is back up to a network location once a week, over the weekend. The computer is rebooted after the backup.
Which two actions should hardening include? (Choose two.)

A. Stop unnecessary services
B. Add wireless access
C. Schedule more frequent backups
D. Disable unused ports
E. Bring patches up-to-date.

A

D. Disable unused ports
E. Bring patches up-to-date.

Wireless Access Point
Windows Server Hardening Checklist

25
A junior network engineer receives a new router to configure. Which two configuration tasks should the engineer perform BEFORE he copies a standard configuration template onto the router? (Choose two.) A. Create an ACl. B. Update the firmware. C. Clear the routing table. D. Change the MAC address. E. Change the default username and password.
B. Update the firmware. E. Change the default username and password. [Configuring Junos OS Routing Tables](https://www.juniper.net/documentation/us/en/software/junos/static-routing/topics/topic-map/config_junos_routing_table.html) [Routers & Firewalls](https://www.lifewire.com/routers-and-firewalls-4781501) [How to Boost Your Router Security](https://www.consumerreports.org/electronics-computers/wireless-routers/ways-to-boost-router-security-a3824459325/) [What is a MAC Address?](https://www.iplocation.net/mac-address#google_vignette)
26
A company's WLAN is configured with one access point (AP) named AP1. AP1 has an SSID of AP1, is configured to use channel 1, and is configured for WPA2-PSK. The company deploys a second AP named AP2 and with an SSID of AP2. The AP is configured to use channel 6 and is configured for WPA2-PSK. It is also configured with a unique IP address range. The remaining configuration settings are left at the defaults. Technical Services discovers that someone has been hacking into AP2 and changing configuration settings. After the settings are corrected, they are changed again in a few days. How should Technical Services implement device hardening to prevent this from occurring? A. Change the default administrator's password on AP2. B. Change AP2 to use channel 1. C. Reconfigure both APs to use WPA2-Enterprise. D. Disable SSID broadcast on both APS.
A. Change the default administrator's password on AP2. [Systems Hardening](https://www.beyondtrust.com/resources/glossary/systems-hardening) [Securing Wireless Networks](https://www.cisa.gov/news-events/news/securing-wireless-networks) [Configure a Standard Wireless Network](https://docs.aerohive.com/330000/docs/help/english/ng/Content/gui/configuration/configuring-wireless-ssid-settings.htm)
27
A recent security audit reveals that users from all locations have full remote access to network devices. Which solution should be implemented to address that problem? A. ACL B. SSH C. IPsec D. CBAC
A. ACL [Access control lists](https://learn.microsoft.com/en-gb/windows/win32/secauthz/access-control-lists?redirectedfrom=MSDN) [Configure Context-Based Access Control (CBAC)](https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/13814-32.html) [Difference between SSH and Telnet](https://www.geeksforgeeks.org/difference-ssh-telnet/) [Overview of IPsec](https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/topic-map/overview-of-ipsec.html)