SEC+_continued Flashcards
______ a section of a network that is isolated from the rest of the netwrok with firewalls.
DMZ (De-Militartized Zone)
Kerberos, SESAME & Active Directory are ______ _______ _______.
three technologies that provide single sign-on authentication.
SESAME (Secure European for Application in a Multi-vendor Environment) is a _____ - ____ _____ ______.
single sign-on technology addressed to issues in Kerberos and is based on public key cryptography.
RSA is an example of ?
Asymmetric cryptography with “authentication”
- RSA is the de facto standard for digital signatures.
- Factor large prime numbers.
What decrypts incoming traffic, examines that traffic and re-encrypts it before it goes back out on the network?
SSL decryptors
What alleviates the load on the processor during encryption, it also transfers the encryption process to a separate device, typically a PCI card for encryption?
SSL/TLS accelerators
IMAP (Internet Message Access protocol) port?
Port 143
Your company has recently purchased several computers that have TPM hardware. Which technology works with this hardware?
IPSEC
Management has decided to purchase a new appliance firewall that will be installed between the public and private networks owned by your company. Which type of firewall is also referred to as an appliance firewall?
Hardware
You need to implement an authentication system that verifies the identity of the users through their eyes? Which type of authentication should you implement?
A retinal scan
A load balancer is a device that distributes network or application traffic across a cluster of servers. Which load balancer scheduling algorithm is used to keep a host connected with the same resource throughout an entire session?
- Affinity-based
- Round-robin
- Active-Passive
- Active-Active
Affinity-based scheduling ensures that all requests from the user during the session are sent to the same instance.
A WAP (Wireless Access Point) is a point of entry/exit for radio-based signals to a network. Which component is used to identify WAPs on a network and is not effective network security when turned off?
- Signal Strength
- Bandwidth selection/width
- SSID
- Antenna Type and Placement
SSID is used to identify a WAP on a network. Turning off a Service Set Identifier (SSID) doesn’t effectively protect a network from attack because the SSID is still sent in plaintext, allowing anyone to sniff it.
Which GPS technology creates a virtual fence around a location and detects mobile devices from entering into that fence?
- Context-aware authentication
- Geolocation
- Containerization
- Geofencing
Geofencing uses a virtual fence around a location and detects mobile devices when entering that fence.
A vulnerability scanner is a program designed to probe a system for misconfiguration, old software versions, and other weaknesses. Which type of vulnerability scanner is used to perform a broad sweep for vulnerabilities on more than one host across the network?
- Application vulnerability scanners
- Host vulnerability scanner
- Network vulnerability scanner
- Configuration Compliance Scanner
A network vulnerability scanner performs a broad sweep for vulnerabilities on more than one host across the network.
Which command provides a list of hops that traffic transverses as it is routed to the remote target?
- nmap
- traceroute
- arp
- tcpdump
The traceroute command lists hops and uses ICMP to build a trace of the packet in route, so if ICMP is blocked on any device, traceroute will be unable to provide information for that device..
Which term is used when a malicious or suspicious event does not trigger a rule on the IDS/IPS?
- anomaly
- behavioral
- false negative
- false positive
A false negative should be reported as they do not trigger a rule, but it should because it has captured a malicious event.
Which protocol is used to securely transfer files between a client and a server over port 22?
- SFTP
- FTP
- HTTPS
- SNMP
Secure File Transfer Protocol (SFTP) runs over port 22 and is used to securely transfer files from a client to a server.
Credentials should be protected at the level in which they’re accessed. Which protocols are a major security concern because they send credentials in plaintext?
- SMTP
- Telnet
- FTP
- SFTP
- HTTPS
SMTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Telnet sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
FTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Which is a security extension for voice and video communications that uses encryption, message authentication, integrity checks, and protection replay?
- SRTP
- LDAPS
- S/MIME
- SSH
SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features such as encryption, message authentication, integrity checks, and protection replay.
What is a baselining?
- a document stipulating constrains and practices that a user must agree to for access to an organization’s network
- a measurement used when a system changes from its original baseline
- an organization’s secure starting point after fixing any security issues
- an organization’s insecure starting point before fixing any security issues
An organization’s baseline starts from a secure posture after fixing any security issues.
Data exfiltration refers to an attacker who is is attempting to export data from a system. How can an admin protect against data exfiltration?
- periodically check for weak settings or misconfigurations on a device
- up-to-date configurations
- weak encryption algorithms
- firewalls without default-deny rules
Devices should be periodically checked for weak or misconfigured settings because most security controls rely on good configurations to perform properly.
Having up-to-date configurations decreases the chance of data exfiltration.
Which deployment model allows a device to be used only for business and is paid for by the organization?
- COBO
- COPE
- CYOD
- BYOD
Corporate-Owned Business Only (COBO) deployment allows a device to be used solely for business and is paid for by the organization.
Port security uses MAC addresses to control access to ports on a switch. Which variant of port security allows specific MAC addresses to an assigned port?
- Static learning
- Sticky learning
- Anti-Spoofing
- Dynamic learning
Static learning controls access to ports by using specific MAC addresses. This method is helpful when using fixed and dedicated hardware.
Which of the following information does a context-aware authentication mechanism use?
- facial recognition
- fingerprint
- connection method
- location of the device
- requested resources
- specific user
- devices in use
Context-aware authentication mechanisms use the CONNECTION METHOD of the device to allow or block access.
Context-aware authentication mechanisms use the LOCATION OF THE DEVICE to allow or block access.
Context-aware authentication mechanisms use the REQUESTED RESOURCE to allow or block access.
Context-aware authentication mechanisms use a SPECIFIC USER of the device to allow or block access.
Context-aware authentication mechanisms checks the DEVICE IN USE to allow or block access.