Podcast
Questions and Answers
A system that Tony manages sends an SNMP trap. What type of information should Tony expect to receive?
A system that Tony manages sends an SNMP trap. What type of information should Tony expect to receive?
- Notification of a vulnerability
- Notification of a patch being installed
- Notification of an issue (correct)
- Notification of user being created
Ben wants to observe malicious behavior targeted at multiple systems on a network. He sets up a variety of systems and instruments to allow him to capture copies of attack tools and to document all the attacks that are conducted. What has he set up?
Ben wants to observe malicious behavior targeted at multiple systems on a network. He sets up a variety of systems and instruments to allow him to capture copies of attack tools and to document all the attacks that are conducted. What has he set up?
- A honeypot
- A beartrap
- A honeynet (correct)
- A tarpit
Valerie wants to replace the telnet access that she found still in use in her organization. Which protocol should she use to replace it, and what port will it run on?
Valerie wants to replace the telnet access that she found still in use in her organization. Which protocol should she use to replace it, and what port will it run on?
- SSH, port 22 (correct)
- RDP, port 3389
- SFTP, port 21
- HTTPS, port 443
Jill wants to use DNS filtering to prevent users in her organization from visiting potentially malicious sites. What type of service should she use to obtain this information?
Jill wants to use DNS filtering to prevent users in her organization from visiting potentially malicious sites. What type of service should she use to obtain this information?
Chuck wants to provide access to a protected network from a less trusted network. What type of solution is commonly implemented to provide a secure, monitored access method?
Chuck wants to provide access to a protected network from a less trusted network. What type of solution is commonly implemented to provide a secure, monitored access method?
Kathleen wants to deploy a firewall that can handle large amounts of network traffic while performing advanced firewalling tasks. What type of device should she select?
Kathleen wants to deploy a firewall that can handle large amounts of network traffic while performing advanced firewalling tasks. What type of device should she select?
Mark wants to prevent DNS poisoning attacks. What technology should he implement to counter them most effectively?
Mark wants to prevent DNS poisoning attacks. What technology should he implement to counter them most effectively?
Casey wants to replace her organization's MPLS-based external connectivity using commodity technologies. What technology should she select to help her manage this?
Casey wants to replace her organization's MPLS-based external connectivity using commodity technologies. What technology should she select to help her manage this?
What protocol is used to securely wrap many otherwise insecure protocols?
What protocol is used to securely wrap many otherwise insecure protocols?
Valentine wants to deploy a secure version of DHCP for her organization. What should she implement?
Valentine wants to deploy a secure version of DHCP for her organization. What should she implement?
What component of a zero-trust architecture forwards requests from subjects and acts on whether subjects are allowed to access resources?
What component of a zero-trust architecture forwards requests from subjects and acts on whether subjects are allowed to access resources?
Gary wants to use secure protocols for email access for his end users. Which of the following groups of protocols should he implement to accomplish this task?
Gary wants to use secure protocols for email access for his end users. Which of the following groups of protocols should he implement to accomplish this task?
Gary wants to prevent his organization's most sensitive data from being accessed by network-based attackers at any cost. What solution should he implement to ensure this?
Gary wants to prevent his organization's most sensitive data from being accessed by network-based attackers at any cost. What solution should he implement to ensure this?
Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?
Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?
What type of NAC will provide Isaac with the greatest amount of information about the systems that are connecting while also giving him the most amount of control of systems and their potential impact on other systems that are connected to the network?
What type of NAC will provide Isaac with the greatest amount of information about the systems that are connecting while also giving him the most amount of control of systems and their potential impact on other systems that are connected to the network?
Danielle's organization has implemented a tool that combines SD-WAN, a CASB, and Zero Trust, among other security functions, to provide security regardless of where her organization's devices are. What type of solution has her organization implemented?
Danielle's organization has implemented a tool that combines SD-WAN, a CASB, and Zero Trust, among other security functions, to provide security regardless of where her organization's devices are. What type of solution has her organization implemented?
Wayne is concerned that an on-path attack has been used against computers he is responsible for. What artifact is he most likely to find associated with this attack?
Wayne is concerned that an on-path attack has been used against computers he is responsible for. What artifact is he most likely to find associated with this attack?
Elle has scanned her organization from an external IP address and has identified all of the services that are visible from the public Internet. What does this enable her to describe?
Elle has scanned her organization from an external IP address and has identified all of the services that are visible from the public Internet. What does this enable her to describe?
What technique is used to ensure that DNSSEC-protected DNS information is trustworthy?
What technique is used to ensure that DNSSEC-protected DNS information is trustworthy?
Fred wants to ensure that the administrative interfaces for the switches and routers are protected so that they cannot be accessed by attackers. Which of the following solutions should he recommend as part of his organization's network design?
Fred wants to ensure that the administrative interfaces for the switches and routers are protected so that they cannot be accessed by attackers. Which of the following solutions should he recommend as part of his organization's network design?
Flashcards
SNMP Trap Information
SNMP Trap Information
Notification of an issue from a managed system.
Honeynet
Honeynet
A network of honeypots designed to trap and analyze malicious activity.
SSH (Secure Shell)
SSH (Secure Shell)
A secure protocol replacing Telnet, operating on port 22.
DNS Filtering with Reputation Service
DNS Filtering with Reputation Service
Signup and view all the flashcards
Jump Server
Jump Server
Signup and view all the flashcards
NGFW (Next-Generation Firewall)
NGFW (Next-Generation Firewall)
Signup and view all the flashcards
DNSSEC
DNSSEC
Signup and view all the flashcards
SD-WAN (Software-Defined WAN)
SD-WAN (Software-Defined WAN)
Signup and view all the flashcards
TLS (Transport Layer Security)
TLS (Transport Layer Security)
Signup and view all the flashcards
Secure DHCP
Secure DHCP
Signup and view all the flashcards
Policy Enforcement Points
Policy Enforcement Points
Signup and view all the flashcards
Secure Email Protocols
Secure Email Protocols
Signup and view all the flashcards
Air Gap
Air Gap
Signup and view all the flashcards
Active/Active Load Balancing
Active/Active Load Balancing
Signup and view all the flashcards