18 Questions
What is the BEST method for creating a detailed diagram of wireless access points and hotspots?
Footprinting
What specific change should be made to resolve the browsing issues at the DR site according to the simulation?
Ensure secure management protocols are used
In the provided firewall ruleset, what type of traffic is explicitly denied?
HTTP
What is the BEST way to solve the issue of VPN concentrator overloading and crashing due to remote workers?
Split tunneling
Which network security principle involves limiting user access rights to only what are strictly required to perform their job functions?
Least privilege
What security concept aims to prevent a single individual from having complete control over a critical process or system?
Separation of duties
Which feature of VPNs allows certain programs to have a secure VPN tunnel while others can access the internet directly?
Split tunneling
What type of traffic splitting helps in reducing traffic overload on VPN concentrators?
Split tunneling
Which method involves actively searching for and mapping out information about computer systems and their entities?
Footprinting
Which advanced VPN feature allows for choosing which apps should have a secure VPN tunnel?
Split tunneling
To reduce the load on servers and data centers, which VPN feature should be used to route only essential traffic through the VPN?
Split tunneling
What was rendered ineffective during a malware outbreak that included successful rootkit installations on many PCs?
Antivirus software
What type of attack is a Logic bomb?
Zero day
In the context of network security, which RAID configuration would ensure data is duplicated for fault tolerance?
RAID 1
What network security measure involves physically isolating a secure computer network from unsecured networks like the Internet?
Air gap
Which RAID configuration offers no redundancy and no fault tolerance?
RAID 0
If a vulnerability scan identifies plugin IDs as 10, 11, 12, 13, and 14 with high risks, which should be prioritized for remediation first?
14
Which of the following is NOT considered a physical security measure for network protection?
VLAN
Test your knowledge on analyzing documents for network security purposes, including viewing metadata, searching for file hashes on malware websites, and detonating documents in an analysis sandbox. Challenge yourself with questions related to VPN concentrator overload and crash issues.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free