Security Flashcards

1
Q
Which feature of an NGFW is designed to protect the network against malware infections?
NGIPS
SPI
AVC
AMP
A

AMP (Advanced Malware Protection). Uses set of signatures to verify file transfers and block malware infections before they reach end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two devices are deployed inline to actively prevent attacks?

A

Firewall

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What format other than the default ASCII can be used when configuring a WPA2 PSK in the Cisco Wireless LAN Controller GUI?
Base64
Hexadecimal
Decimal
Binary
A

Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
In a wireless network protected by WPA3, which algorithm is used to check the integrity of a message?
SHA
GMAC
CBC-MAC
AES
A

GMAC (Galois Message Authentication Code) used for Integrity

AES used for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Gratuitous ARP messages can be exploited to make which two kinds of attacks?
Eavesdropping
Reconnaissance Attack
Spoofing Attack
DDoS
DoS
Amplification Attack
A

Eavesdropping

Spoofing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which two combinations of authentication methods are considered MFA?
PIN and Password
PIN and Smart card
Fingerprint and retina
Password and fingerprint
Username and password
A

PIN and smart card

Password and fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main security reason behind deprecating the wireless TKIP standard?

A

Using RC4

RC4 is a legacy cipher that is susceptible to offline and dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What will be the result of installing an IPS sensor using the promiscuous mode?

A

The sensor receives a copy of the traffic only.

Promiscuous Mode = Makes IPS into an IDS and only alerts the administrator
In-Line Mode = Allows IPS to analyze traffic and actively block attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network has experienced a number of MitM attacks. Which three mitigation techniques could be used to secure the network?

A

Encryption
User Training
DAI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Match an AAA concept with its basic usage.
Authentication
Authorization
Accounting

A

Authentication: Network access is granted or denied
Authorization: A dedicated VLAN is assigned
Accounting: Sessions are recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which set of commands should be used to enable DHCP snooping on a switch.

A

ip dhcp snooping
ip dhcp snooping vlan
interface fa/g
ip dhcp snooping trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly