Review Questions - SYS701 - 12 - Network Security
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A system that Tony manages sends an SNMP trap. What type of information should Tony expect to receive?

  • Notification of a vulnerability
  • Notification of a patch being installed
  • Notification of an issue (correct)
  • Notification of user being created

Ben wants to observe malicious behavior targeted at multiple systems on a network. He sets up a variety of systems and instruments to allow him to capture copies of attack tools and to document all the attacks that are conducted. What has he set up?

  • A honeypot
  • A beartrap
  • A honeynet (correct)
  • A tarpit

Valerie wants to replace the telnet access that she found still in use in her organization. Which protocol should she use to replace it, and what port will it run on?

  • SSH, port 22 (correct)
  • RDP, port 3389
  • SFTP, port 21
  • HTTPS, port 443

Jill wants to use DNS filtering to prevent users in her organization from visiting potentially malicious sites. What type of service should she use to obtain this information?

<p>A reputation service (D)</p> Signup and view all the answers

Chuck wants to provide access to a protected network from a less trusted network. What type of solution is commonly implemented to provide a secure, monitored access method?

<p>A jump server (B)</p> Signup and view all the answers

Kathleen wants to deploy a firewall that can handle large amounts of network traffic while performing advanced firewalling tasks. What type of device should she select?

<p>A NGFW (A)</p> Signup and view all the answers

Mark wants to prevent DNS poisoning attacks. What technology should he implement to counter them most effectively?

<p>DNSSEC (A)</p> Signup and view all the answers

Casey wants to replace her organization's MPLS-based external connectivity using commodity technologies. What technology should she select to help her manage this?

<p>SD-WAN (C)</p> Signup and view all the answers

What protocol is used to securely wrap many otherwise insecure protocols?

<p>TLS (D)</p> Signup and view all the answers

Valentine wants to deploy a secure version of DHCP for her organization. What should she implement?

<p>There is no secured version of DHCP. (D)</p> Signup and view all the answers

What component of a zero-trust architecture forwards requests from subjects and acts on whether subjects are allowed to access resources?

<p>Policy enforcement points (B)</p> Signup and view all the answers

Gary wants to use secure protocols for email access for his end users. Which of the following groups of protocols should he implement to accomplish this task?

<p>POPS, IMAPS, HTTPS (C)</p> Signup and view all the answers

Gary wants to prevent his organization's most sensitive data from being accessed by network-based attackers at any cost. What solution should he implement to ensure this?

<p>An air gap (D)</p> Signup and view all the answers

Madhuri is designing a load-balancing configuration for her company and wants to keep a single node from being overloaded. What type of design will meet this need?

<p>Active/active (B)</p> Signup and view all the answers

What type of NAC will provide Isaac with the greatest amount of information about the systems that are connecting while also giving him the most amount of control of systems and their potential impact on other systems that are connected to the network?

<p>Agent-based, preadmission NAC (A)</p> Signup and view all the answers

Danielle's organization has implemented a tool that combines SD-WAN, a CASB, and Zero Trust, among other security functions, to provide security regardless of where her organization's devices are. What type of solution has her organization implemented?

<p>SASE (D)</p> Signup and view all the answers

Wayne is concerned that an on-path attack has been used against computers he is responsible for. What artifact is he most likely to find associated with this attack?

<p>A browser plug-in (B)</p> Signup and view all the answers

Elle has scanned her organization from an external IP address and has identified all of the services that are visible from the public Internet. What does this enable her to describe?

<p>Her organization's attack surface (C)</p> Signup and view all the answers

What technique is used to ensure that DNSSEC-protected DNS information is trustworthy?

<p>It is digitally signed. (A)</p> Signup and view all the answers

Fred wants to ensure that the administrative interfaces for the switches and routers are protected so that they cannot be accessed by attackers. Which of the following solutions should he recommend as part of his organization's network design?

<p>Out-of-band management (C)</p> Signup and view all the answers

Flashcards

SNMP Trap Information

Notification of an issue from a managed system.

Honeynet

A network of honeypots designed to trap and analyze malicious activity.

SSH (Secure Shell)

A secure protocol replacing Telnet, operating on port 22.

DNS Filtering with Reputation Service

A service that filters DNS requests based on the reputation of the destination.

Signup and view all the flashcards

Jump Server

A server that acts as an intermediary to access a protected network.

Signup and view all the flashcards

NGFW (Next-Generation Firewall)

Firewall that performs advanced inspection of network traffic.

Signup and view all the flashcards

DNSSEC

A suite of DNS security extensions that prevents DNS poisoning attacks.

Signup and view all the flashcards

SD-WAN (Software-Defined WAN)

Technology that helps manage connectivity using commodity internet services.

Signup and view all the flashcards

TLS (Transport Layer Security)

A protocol used to encrypt communication for many different protocols.

Signup and view all the flashcards

Secure DHCP

There is no secure version of DHCP.

Signup and view all the flashcards

Policy Enforcement Points

Component in zero-trust architecture that grants or denies resource access.

Signup and view all the flashcards

Secure Email Protocols

POPS, IMAPS, and HTTPS are all used in secure email access.

Signup and view all the flashcards

Air Gap

Physically isolating a network from all other networks.

Signup and view all the flashcards

Active/Active Load Balancing

A load-balancing design where all nodes are active and handle traffic.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser