Practice Test 2 Part 2 Flashcards
(48 cards)
Which method is MOST EFFECTIVE for detecting traffic anomalies caused by a Distributed Denial of Service (DDoS) attack?
A) Monitoring bandwidth usage across different network segments
B) Filtering packets by source IP address
C) Conducting deep packet inspection to analyze traffic content
D) Using NetFlow data to analyze traffic patterns and volume
D) Using NetFlow data to analyze traffic patterns and volume
Which method is LEAST COST-EFFECTIVE for managing unexpected network congestion during peak usage?
A) Analyzing traffic patterns
B) Implementing intelligent load balancing across multiple paths
C) Utilizing real-time monitoring
D) Expanding physical bandwidth
D) Expanding physical bandwidth
Which scenario would require the SHORTEST RPO?
A) A financial institution processing high-frequency transactions
B) A research facility storing archived experimental data
C) A marketing agency working on weekly campaigns
D) A remote backup service provider with nightly backups
A) A financial institution processing high-frequency transactions
Which of the following best describes a cold site in the context of disaster recovery?
A) A fully equipped and immediately operational backup site
B) A site with the basic infrastructure but requires setup and configuration before use
C) A backup site that mirrors the primary site in real-time
D) A site that can be activated within minutes and is fully functional
B) A site with the basic infrastructure but requires setup and configuration before use
Which of the following best describes an active-active configuration in a high availability setup?
A) All nodes are active, sharing the load and providing redundancy in case of failure
B) Only one node is active at a time, with the other node on standby to take over if needed
C) The system alternates between active nodes based on a predefined schedule
D) All nodes are passive and only become active when a failure is detected
A) All nodes are active, sharing the load and providing redundancy in case of failure
Which of the following best describes the importance of tabletop exercises in disaster recovery planning?
A) They simulate full-scale disasters to test the physical response capabilities of an organization
B) They involve informal discussions to identify potential weaknesses in a recovery plan
C) They focus on the real-time execution of the disaster recovery plan to evaluate its effectiveness
D) They provide a cost-effective way to evaluate recovery procedures through structured, scenario-based discussions
D) They provide a cost-effective way to evaluate recovery procedures through structured, scenario-based discussions
Which of the following best explains the purpose of DHCP lease time in network management?
A) It determines the duration for which a DHCP server blocks unauthorized devices
B) It sets the interval for the DHCP server to assign new IP addresses to all devices
C) It controls the maximum number of devices that can connect to the network simultaneously
D) It defines the time period a device can use an IP address before it must renew the lease
D) It defines the time period a device can use an IP address before it must renew the lease
Which of the following DNS record types is used to map a domain name to an IPv4 address?
A) AAAA
B) MX
C) CNAME
D) A
D) A
A network administrator wants to ensure that DNS queries and responses are encrypted to prevent eavesdropping and tampering.
Which secure DNS protocols should they consider implementing?
A) DNSSEC and DoT
B) DoH and DNSSEC
C) DoT and DoH
D) DNSSEC and Reverse DNS
C) DoT and DoH
Which of the following is NOT an accurate statement about VPN types?
A) Split tunnel VPN routes all traffic through the VPN, ensuring all data is secured
B) Clientless VPN allows access to specific applications through a web browser without installing VPN software
C) Full tunnel VPN routes all network traffic through the VPN, providing comprehensive security
D) Split tunnel VPN allows only specific traffic to go through the VPN while other traffic goes directly to the internet
A) Split tunnel VPN routes all traffic through the VPN, ensuring all data is secured
Which of the following best describes the purpose of a jump box in network security?
A) It acts as an intermediary, providing secure access to and from isolated network segments
B) It enhances network performance by optimizing traffic flow between devices
C) It provides direct access to critical network devices from any location
D) It automatically backs up configuration files for network devices
A) It acts as an intermediary, providing secure access to and from isolated network segment
Which of the following is NOT a protocol used to encrypt data in transit?
A) TLS
B) HTTPS
C) RADIUS
D) IPsec
C) RADIUS
Which of the following is NOT a key feature of SSO in IAM?
A) It allows users to access multiple applications with one set of credentials
B) It reduces the number of passwords users need to remember
C) It enhances security by requiring multiple forms of authentication
D) It simplifies the user experience by minimizing login prompts
C) It enhances security by requiring multiple forms of authentication
Which of the following is NOT a benefit of implementing RBAC in an organization?
A) Simplifies the management of user permissions by assigning roles instead of individual permissions
B) Reduces the risk of unauthorized access by limiting users to only the resources necessary for their roles
C) Provides users with the ability to adjust their own access levels based on their needs
D) Enhances security by enforcing the principle of least privilege through predefined roles
C) Provides users with the ability to adjust their own access levels based on their needs
After a series of security breaches, a company is considering adding more physical barriers to its data center.
What is the most likely benefit of installing additional physical barriers?
A) They will reduce the need for electronic monitoring systems
B) They will increase the complexity of security policies
C) They will provide an additional layer of protection against unauthorized physical access
D) They will improve the effectiveness of remote access management
C) They will provide an additional layer of protection against unauthorized physical access
Which of the following is NOT a primary characteristic of a honeynet?
A) It consists of multiple honeypots working together to simulate a network environment
B) It is designed to actively block and prevent attackers from accessing real systems
C) It gathers extensive data on attacker behaviors across various decoy systems
D) It can mimic the infrastructure of an actual network to deceive attackers
B) It is designed to actively block and prevent attackers from accessing real systems
During an investigation, a security analyst discovers that an attacker gained unauthorized access to a server by exploiting a vulnerability in a legacy application. The attacker was able to execute code remotely and elevate privileges, allowing them full control of the system.
What type of vulnerability or technique did the attacker most likely exploit?
A) Buffer overflow
B) Zero-day exploit
C) Social engineering
D) SQL injection
A) Buffer overflow
A manufacturing company is concerned about the security risks posed by its IIoT devices, which are connected to both production machinery and the corporate network.
To minimize the impact of potential cyberattacks on critical operations, what strategy should the company implement?
A) Place all IIoT devices on the same network segment as the corporate servers
B) Segregate IIoT devices into a separate network segment isolated from critical systems
C) Use a single firewall to protect both IIoT and corporate networks
D) Disable remote access to all IIoT devices
B) Segregate IIoT devices into a separate network segment isolated from critical systems
A network administrator notices a significant drop in the availability of a critical web service, accompanied by unusually high inbound traffic from multiple sources.
Which of the following is the MOST likely cause of this issue?
A) A misconfigured firewall rule allowing excessive traffic
B) A DDoS attack
C) An internal server error causing the service to crash
D) An unauthorized user accessing the web service
B) A DDoS attack
Which of the following best describes the impact of a successful MAC flooding attack on a network switch?
A) The switch forwards all incoming frames to the destination device without any delays
B) The switch reroutes traffic through a secure VLAN to mitigate the flooding
C) The switch immediately shuts down affected ports to prevent further flooding
D) The switch’s CAM table is overflowed, causing it to broadcast all incoming frames to all ports
D) The switch’s CAM table is overflowed, causing it to broadcast all incoming frames to all ports
Which of the following is NOT an effective method for mitigating ARP spoofing?
A) Implementing IPsec to encrypt ARP traffic
B) Enabling DAI on the network
C) Configuring static ARP entries on critical devices
D) Using port security to restrict access based on MAC addresses
A) Implementing IPsec to encrypt ARP traffic
A network administrator notices that some devices on the network are receiving incorrect IP addresses, leading to connectivity issues. Upon investigation, they discover that an unauthorized device is assigning IP addresses.
Which of the following actions would BEST mitigate this issue?
A) Implement DHCP snooping on all network switches
B) Increase the DHCP lease time to reduce IP address changes
C) Disable the unauthorized device’s network port
D) Configure static IP addresses for all devices on the network
A) Implement DHCP snooping on all network switches
Which of the following is NOT a typical method used in an on-path attack?
A) Intercepting and altering data packets between two devices
B) Impersonating one party in the communication to gather information
C) Flooding the network with traffic to disrupt communication
D) Eavesdropping on communication to steal sensitive information
C) Flooding the network with traffic to disrupt communication
An employee reports that after installing a seemingly legitimate software update from an unfamiliar source, they noticed a new application running in the background that they didn’t recognize. The system remains responsive, but confidential files have started to disappear, and an outbound connection to an unknown server has been detected.
What is the MOST likely explanation for these symptoms?
A) The system has been infected with a worm that is spreading across the network
B) The software update contained Trojan malware that is now active on the system
C) The computer is under a ransomware attack that is encrypting files in the background
D) The system has been compromised by spyware that is collecting sensitive data
B) The software update contained Trojan malware that is now active on the system