click below
click below
Normal Size Small Size show me how
IS316
VPN
| Question | Answer |
|---|---|
| What are security Objectives | Goals an organization strives to achieve through its security efforts. 3 primary security objectives are confidentiality, integrity, and Availability. |
| Encryption is primarily concerned with which of the primary objectives? | Confidentiality |
| Who is responsible for network security? | Everyone |
| Which Security group is responsible for managing network vulnerabilities and threats | IT Security staff |
| What are the 2 elements of network design that have the greatest risk of causing DoS? | Single point of failure & a bottle neck |
| Which of the following is true regarding a layer 2 address and layer 3 address? | Layer 2 address can be filtered with MAC address filtering |
| Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of which of the following? | policy |
| which is the most important consideration when designing a network? | Scalability |
| What can you detect by analyzing a data packet? | network vulnerabilities |
| Which of the following is true about NetWitness Investigator? | supports IPv6 only |
| Which of the following is not covered by a data loss/data leak prevention tool? | Paper documents. |
| Which of the following is not a purpose of network analysis? | Detect security policy violations |
| Where do you capture network data to analyze inbound/ outbound network traffic? | Inside the perimeter firewall |
| Promiscuous mode (IPS) is most commonly associated with which of the following? | A network interface |
| What is a firewall? | A filtering device that enforces network security policy and protects the network against external attacks |
| Which network component filters traffic between nodes? | Firewall |
| What type off firewall keeps track of state tables to sieve network traffic | Statefull firewall |
| Which protocol is a connected-oriented protocol that operates at the transport layer of the osi model and supports reliable connections? | TCP/IP |
| What can you accomplish by filtering network packets? | ? |
| What does an application-level proxy do? | A type of firewall that filters on a specific applications content and session info. |
| What is ingress filtering? | Monitoring traffic on its way inbound |
| Content filtering can focus on the following aspects of traffic except? | Source or destination IP address |
| Which of the following will prevent firewall filtering from blocking malicious content? | Encrypted traffic |
| Dynamic packet filtering is also known as... | Stateful inspection |
| Which of the following is a problem for static filtering? | Random source ports |
| Which of the following characteristics does not apply to stateful firewalls | Analyze static data only |
| What is used by TCP to establish a session between 2 systems? | a three-way handshake |
| When planning a firewall implementation, which of the following is the key consideration? | Availability Address space Skill set of support personnel All of these |
| What are the benefits of using VPNs? | Cost savings, and network scalability. To the clients accessing these networks, and ease of use. |
| Which of the following is not ensured or provided by a secured VPN? | Quality of service |
| Which of the following techniques makes a VPN private? | A single organization owning all the supporting infrastructure components |
| What form of VPN deployment prevents VPN traffic from being filtered? | Corporate Firewall |
| Which aspect of the VPN prevents others from eavesdropping and observation? | Symmetric Cryptography |
| What form of VPN deployment requires additional authentication for accessing? resources across the VPN | edge router |
| What are the two most important features of VPN authentication? | Scalability and interoperability |
| What is usually the first activity in the hacking process | Reconnaissance or footprinting |
| What type of attack can result in arbitrary code execution with system level privileges? | Buffer overflow |
| Most exploits are based on the existence of what? | System anomalies |
| What form of attack can potentially evade an IDS? | Insertion |
| What form of attack captures authentication packets to transmit them later? | Replay |
| Which exploit takes advantage of variable MTUs? | Fragmentation |
| Which form of attack submits excessive data to a target to cause arbitrary code execution | Buffer overflow |
| Which of the following might a hacker offer as a service? | Dos Spam Distribution Password Hacking |
| Which of the following IT domain is most vulnerable to social engineering? | User |
| Which of the following is a social engineering technique? | Impersonation Reciprocity Phishing |
| what are the characteristics included in a reverse proxy | Caching |
| Which of the following is not an important factor when included as part of network design? | Obscurity |
| Logging what time a user accessed a particular resource is an example of which of the following? | Accounting |
| Which IT infrastructure domain does not require firewalls to be included as part of its network design? | User domain |
| What is the benefit of private addressing that is not present in public address? | Isolation from the internet |
| Which domain marks the boundary where the private network meets the public network? | LAN-to-WAN |
| To develop an AUP, you need to __________ ? | Establish baseline rules |
| What is not an element of System hardening? | Implementing ingress and egress filtering against spoof addresses |
| Uninstalling all unnecessary applications and services is an example of what? | System hardening |
| What is not usually a part of System hardening? | Installing additional RAM |
| Purpose of authentication? | Verify entity identity |
| Firewall host fails and reverts to a state where all communications between the internet and DMZ is cut off displays what kind of defense? | Fail-close |
| Purpose of physical security access control is to... | Limit interaction between people and devices |
| Incident response is a planned reaction to a negative situation or events. what is not a common step or phase in an incident response? | Assessment |
| The only protection against data loss is... | Backup and recovery |
| Common mistakes or security problems that should not be addressed in awareness training? | Using resources from other subnets of which the host is not a member |
| NOT security management best practices | Assign maximum required permissions |
| NOT a valid incident response strategy phase | Collection |
| NOT the best security management tools | Expensive commercial products |
| purpose of security checklist | Ensure all security elements are still effective |
| An admin must organize to ensure follow-through of a new security plan... | End-user training and awareness |
| Steps of security assessment... | Perform risk assessment, penetration test, and vulnerability scan |
| Fingerprint use to unlock a workstation is an example of what? | Something you are |
| primary purpose of log monitoring? | Detect reconnaissance attempts |
| Where should the firewall rules which explicitly deny traffic be placed | At the bottom |
| What is the most important practice associated with firewall logging? | Understanding how to interpret firewall logs |
| Which firewall limitation is typically characterized by a memory-based exploit? | Buffer overflow |
| Building your own firewall can result in what? | Cost savings |
| Dealing with a firewall emergency what should you not do? | Document you network |
| Valid network monitoring tool | SmokePing` |
| True for VPN? | Works across the Internet, not the intranet |
| default deny appears where in the rule set? | Last |
| mechanism allows a firewall to hand off authentication to a dedicated service hosted on a different system | IEEE 802.1x |
| First deploying a firewall and choosing to begin logging activity, what should you include in log file | ALL events including malicious traffic, Dos traffic, dropped packets, allowed packets |
| Event in firewall log which is a clue of a rogue host operating within the private network | Packets from unassigned internal address |
| Not a limitation or potential weakness of a firewall | Using first match apply rule systems |
| wont inprove or maintain performing of a firewall | Native antivirus scannning |
| Form of encryption allows a firewall to filter based on original source and destination address(assume the firewall is located along the path between session endpoints?) | Transport mode |
| NOT a viable option for enterprise network that needs control and filter network traffic | Physical firewall |
| Use for a reverse proxy | Offer external entities access to an internal web server |
| Most important aspect or feature of a bastion host OS | Resistance to attacks and compromise attempts |
| What is always the most important element within a firewall rule set? | Final rule of default-deny |