Physical Security and Risk Flashcards

1
Q

In general, firewalls work by _________.

Rejecting all packets regardless of security restrictions

Forwarding all packets regardless of security restrictions

Allowing only packets that pass security restrictions to be forwarded

A

Allowing only packets that pass security restrictions to be forwarded

Firewalls work by allowing only packets that pass security restrictions to be forwarded through the firewall. A firewall can also permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it; this can be between a public and private network or between different security domains (or zones) on a private network. You, as the administrator, set up the rules by which a firewall decides to forward or reject packets of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following devices can read an entry card from a distance?

Biometric reader

Proximity reader

Mantrap

A

Proximity reader

Proximity readers are door controls that read a card from a short distance and are used to control access to sensitive rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main difference between a network-based firewall and a host-based firewall?

A network-based firewall protects the Internet from attacks.

A network-based firewall protects a network, not just a single host.

A network-based firewall protects the network wires.

A

A network-based firewall protects a network, not just a single host.

A network-based firewall is what companies use to protect their private network from attacks sourced in the public network. The defining characteristic of this type of firewall is that it’s designed to protect an entire network of computers as opposed to just one system. This is usually a combination of hardware and software. A host-based firewall is implemented on one machine and is designed to protect that machine only. Most often, this is implemented as software; no additional hardware is required on your personal computer to run a host-based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following minimizes the effect of a disaster and includes the steps necessary to resume normal operation?

SLA

BIA

DRP

A

DRP

A properly designed disaster recovery plan (DRP) minimizes the effect of a disaster and includes the steps necessary to resume normal operation. The DRP is implemented when the emergency occurs and includes the steps to restore functions and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following items cannot be identified by the Nessus program?

Default password use

Incorrect IP addresses

Unsecured data

A

Incorrect IP addresses

Nessus cannot identify incorrect IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of using a firewall?

Protects external users

Protects external hardware

Protects LAN resources

A

Protects LAN resources

One of the benefits of using a firewall is that it helps protect LAN resources from unwanted attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IDSs can identify attackers by their _______.

Port number

Signature

Timing

A

Signature

An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion. Intrusions are detected by an attack signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is also called disk striping?

RAID-0

RAID-1

RAID-3

A

RAID-0

RAID-0, also called disk striping, writes the data across multiple drives. While it improves performance, it does not provide fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is not a type of access control list (ACL)?

Standard

Extended

Referred

A

Referred

Standard, extended, and outbound are all types of ACLs. Referred is not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is it called when the firewall ignores an attack?

Logging

Shunning

Notification

A

Shunning

You can sometimes just ignore the attack because it’s possible it won’t affect your network. This is called shunning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of a DMZ?

To separate a security zone for an IPS and IDS server

To create a security zone for VPN terminations

To create a security zone that allows public traffic but is isolated from the private inside network

A

To create a security zone that allows public traffic but is isolated from the private inside network

A DMZ can be set up many different ways, but the best explanation is that the DMZ is used to separate and secure your inside network from the Internet while still allowing hosts on the Internet to access your servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are types of services that firewalls can provide?

Content filtering

Segregation of network segments

Signature identification

Scanning services

All of the above

A

All of the above

Most firewalls provide content filtering, signature identification, and the ability to segregate network segments into separate security zones. Most firewalls are also capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In which type of test is the testing team provided with limited knowledge of the network systems and devices, using publicly available information, while the security team knows the test is coming?

Blind test

Double-blind test

Target test

A

Blind test

In a blind test, the testing team is provided with limited knowledge of the network systems and devices, using publicly available information. The organization’s security team knows that an attack is coming. This type of test requires more effort by the testing team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is a vulnerability scanner?

Network Monitor

Nessus

Traceroute

A

Nessus

Nessus is a proprietary vulnerability scanning program that requires a license for commercial use yet is the single most popular scanning program in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a function of Nmap?

Perform port scanning

Identify operating systems

Collect passwords

A

Collect passwords

Nmap does not collect passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Changing network configurations, terminating sessions, and deceiving the attacker are actions that can be taken from what type of security device?

Access control list (ACL)

Content filter

Intrusion prevention system (IPS)

A

Intrusion prevention system (IPS)

Changing network configurations, terminating sessions, and deceiving the attacker are all actions that can be taken by an IPS device

17
Q

___________ act on behalf of the whole network to completely separate packets from internal hosts and external hosts.

Honeypots

IDSs

Proxies

A

Proxies

Proxies act on behalf of the whole network to completely separate packets from internal hosts and external hosts

18
Q

Which of the following cannot be identified by Nessus?

Unsecured access to sensitive data on a system

IP address conflicts

Misconfigurations like open mail relay

A

IP address conflicts

Nessus operates by performing a port scan and then follows up with more specific tests, but it cannot identify IP address conflicts

19
Q

A _________ firewall keeps track of the established connections passing through it.

Hardware

Software

Stateful

A

Stateful

A stateful firewall keeps track of the established connections passing through it. When another packet is received that’s part of an existing connection (part of a current state), the packet is passed without checking the ACLs

20
Q

A(n) _______ learns what is “normal” on the network and can react to abnormalities even if they’re not part of the signature database.

IDS

Firewall

IPS

A

IPS

An intrusion prevention system (IPS) is like an IDS but with two key differences. First, it learns what is “normal” on the network and can react to abnormalities even if they’re not part of the signature database. Second, it can issue an active response such as shutting down a port, resetting connections, or attempting to lull an attacker into a trap