Review 10 Flashcards

(20 cards)

1
Q

Which of the following is a benefit of hardening?

Reduced Attack Surface

Improved Data Protection

Enhanced System Stability

All of the above

A

All of the above

Benefits of hardening include reduced attack surface, improved data protection, and enhanced system stability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Deploying systems in a secure configuration is known as ___________.

network hardening

device hardening

application hardening

system hardening

A

device hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which authentication service is a web page that pops up when you access a public Wi-Fi?

Kerberos

IEEE 802.1x

Captive Portal

SSO

A

Captive Portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are certificates obtained from?

Digital Certificate Infrastructure

Public Certificate Store

Digital Certificate Vendor

Public Key Infrastructure

A

Digital Certificate Vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of switch port security automatically adds MAC addresses?

Dynamic locking

Static locking

Automatic locking

Combination locking

A

Dynamic locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term describes the verification of the provided identification credentials?

Confirmation

Authentication

Identification

Authorization

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which switch attack associates the attacker’s MAC address with the IP address of target’s device?

VLAN Hopping

MAC spoofing

MAC flooding

ARP poisoning

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Perimeter level?

ACLs

VLANs

Antivirus

Firewalls

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which switch port security violation mode is the default violation mode?

Restrict mode

Protect mode

Report mode

Shutdown mode

A

Shutdown mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of authentication utilizes a three-way handshake (challenge/response) authentication protocol for remote access connections?

CHAP

Kerberos

MS-CHAP

EAP

A

CHAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT a firewall misconfiguration?

Failure to apply an implicit deny

Overly permissive ACL

Overly prohibitive ACL

Failure to apply an implicit allow

A

Failure to apply an implicit allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of authentication is normally used when joining a VPN?

802.1x

EAP

Kerberos

Remote authentication

A

Remote Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which term describes granting users just enough rights to perform their job?

Separation of Duties

Principle of Least Privilege

Privileged Access

Role-Based Access Control

A

Principle of Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Application level?

Antivirus

Firewalls

ACLs

VLANs

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of switch port security manually adds MAC addresses?

Combination locking

Static locking

Automatic locking

Dynamic locking

A

Static locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which AAA system is often used in authenticating administrative access to routers and switches?

802.1x

EAP

TACACS+

RADIUS

17
Q

A _____________ is a digital document that is altered in such a way that it could have come only from the subject identified in the certificate.

digital certificate

unique signature

digital signature

verifiable certificate

A

digital signature

18
Q

Which of the following is NOT an authentication method?

Something you make

Something you know

Something you do

Something you are

A

Something you make

19
Q

What term describes a distributed access method that allows a subject to log in (sign on) once to a network and access all authorized resources on the network?

Captive portal

Mutual authentication

SSO

Distributed authorization

20
Q

When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Data level?

ACLs

Antivirus

Firewalls

VLANs