Review 10 Flashcards
(20 cards)
Which of the following is a benefit of hardening?
Reduced Attack Surface
Improved Data Protection
Enhanced System Stability
All of the above
All of the above
Benefits of hardening include reduced attack surface, improved data protection, and enhanced system stability.
Deploying systems in a secure configuration is known as ___________.
network hardening
device hardening
application hardening
system hardening
device hardening
Which authentication service is a web page that pops up when you access a public Wi-Fi?
Kerberos
IEEE 802.1x
Captive Portal
SSO
Captive Portal
Where are certificates obtained from?
Digital Certificate Infrastructure
Public Certificate Store
Digital Certificate Vendor
Public Key Infrastructure
Digital Certificate Vendor
Which type of switch port security automatically adds MAC addresses?
Dynamic locking
Static locking
Automatic locking
Combination locking
Dynamic locking
What term describes the verification of the provided identification credentials?
Confirmation
Authentication
Identification
Authorization
Authentication
Which switch attack associates the attacker’s MAC address with the IP address of target’s device?
VLAN Hopping
MAC spoofing
MAC flooding
ARP poisoning
ARP poisoning
When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Perimeter level?
ACLs
VLANs
Antivirus
Firewalls
Firewalls
Which switch port security violation mode is the default violation mode?
Restrict mode
Protect mode
Report mode
Shutdown mode
Shutdown mode
Which type of authentication utilizes a three-way handshake (challenge/response) authentication protocol for remote access connections?
CHAP
Kerberos
MS-CHAP
EAP
CHAP
Which of the following is NOT a firewall misconfiguration?
Failure to apply an implicit deny
Overly permissive ACL
Overly prohibitive ACL
Failure to apply an implicit allow
Failure to apply an implicit allow
Which type of authentication is normally used when joining a VPN?
802.1x
EAP
Kerberos
Remote authentication
Remote Authentication
Which term describes granting users just enough rights to perform their job?
Separation of Duties
Principle of Least Privilege
Privileged Access
Role-Based Access Control
Principle of Least Privilege
When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Application level?
Antivirus
Firewalls
ACLs
VLANs
Antivirus
Which type of switch port security manually adds MAC addresses?
Combination locking
Static locking
Automatic locking
Dynamic locking
Static locking
Which AAA system is often used in authenticating administrative access to routers and switches?
802.1x
EAP
TACACS+
RADIUS
TACACS+
A _____________ is a digital document that is altered in such a way that it could have come only from the subject identified in the certificate.
digital certificate
unique signature
digital signature
verifiable certificate
digital signature
Which of the following is NOT an authentication method?
Something you make
Something you know
Something you do
Something you are
Something you make
What term describes a distributed access method that allows a subject to log in (sign on) once to a network and access all authorized resources on the network?
Captive portal
Mutual authentication
SSO
Distributed authorization
SSO
When utilizing ‘Defense in Depth’, which type of security control would be utilized at the Data level?
ACLs
Antivirus
Firewalls
VLANs
ACLs