Network Security Exam Review Questions Flashcards

1
Q

1) A company called TopFix was attacked with XSS and SQLi. To prevent this from happening again, they hired you to implement security measures. Which of the following would you implement?
A. IPS
B. DMZ
C. WAF
D. All of the above

A

D. All of the above
Chapter 1: Network Security Systems & Architecture Section 5: Network Security Systems page 19-20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2) To secure a connection to your company’s servers, you were asked to implement a proxy in the DMZ. Which kind of proxy would that be?
A. Intra-DMZ proxy
B. Remote proxy
C. Reverse proxy
D. Forward proxy

A

Reverse proxy is for the servers, behind the firewall
Chapter 1: Network Security Systems & Architecture: Section 4: Network Security Design page 17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3) The Dot1X authentication process failed, and during an investigation of the incident, it was concluded that the submitted credentials were not the same as those that were in the server.
Which component is at fault?
A. Supplicant
B. Sender
C. Authenticator
D. Authentication server

A

A. Supplicant
The supplicant, or client, is the device attempting to gain access to the network.

Chapter 2: Secure Management & Access: Section 3: 802.1X Authentication page 30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4) During an attack investigation, the NTP service was compromised. What kind of mitigation can you implement to resolve the issue?
A. Router Authentication
B. NTP Access Control
C. NTP Authentication
D. False Update Prevention

A

NTP Access Control - limit types of NTP access and NTP sources associating with out router.
Chapter 3 Network Attacks & Mitigation: Section 7: NTP Attacks page 55

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5) During an attack investigation, it was concluded that the switch started acting like a hub. What could have happened to it?
A. The switch’s MAC table was flooded.
B. The switch’s violation mode changed to “shutdown”.
C. NTP authentication.
D. LLDP stopped working.

A

A. The switch’s MAC table was flooded.
Chapter 3 Network Attacks & Mitigation: Section 2: CAM Table Overflow page 36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6) While extracting a PK signed file, a JFIF signature was found within it. Based on the given signature, what was downloaded?
A. An executable file.
B. A zipped file.
C. An executable that opens an image.
D. A zipped jpeg file.

A

D. A zipped jpeg file.
Chapter 4: Network Traffic Analysis: Section 3: File Extraction page 71

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7) While upgrading from HTTP to HTTPS, you noticed via Wireshark that the content is no longer readable. What is implemented in HTTPS that is not implemented in HTTP?
A. Encryption
B. Decoding
C. Encoding
D. Decryption

A

A. Encryption
Chapter 5: Practical Cryptography: Section 1: Cryptographic Concepts page 78

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8) The organization you work for installed a new firewall. However, many notifications began flooding the blue team. What can be done to get rid of those notifications and stay protected?
A. Change Firewall action to Reject.
B. Change Firewall action to Drop.
C. Change Firewall action to Allow.
D. Change Firewall action to Hide.

A

B. Change Firewall action to Drop.
Chapter 6: Firewall Fundamentals: Section 1: Firewall Introduction page 92

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9) The TopFix company requires VPN service to allow workers to access the resources from home. Which VPN type should the company implement?
A. Home-to-Site VPN
B. Remote Access VPN
C. Shared-Access VPN
D. Site-to-Site VPN

A

B. Remote Access VPN

Chapter 7: VPN Technologies: Section 3: Remote Access VPN page 105

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10) SNMP is vulnerable to manipulation and allows attackers to obtain unauthorized access, because it is based on unsecure strings. What can be done to mitigate that problem?
A. Use public strings.
B. Downgrade to SNMPv2.
C. Upgrade to SNMPv3.
D. Switch to ACL implementation.

A

C. Upgrade to SNMPv3.
Chapter 8: Network Monitoring: Section 2: Simple Network Management Protocol page 115

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11) John, a network administrator, suggested incorporating an IPS system in the network. He asks for your advice where to place it. Which of the following should you suggest?
A. Place the IPS on a gateway.
B. Place the IPS on a switch’s TAP port.
C. Place the IPS in the DMZ.
D. Place the IPS on the host computers.

A

A. Place the IPS on a gateway.
Chapter 9: IPS & IDS Concepts: Section 1: Intrusion Detection & Prevention page 127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly