What is the recommended way to protect a WPA2 network choose all the answers that you think are correct?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Quiz

Terms in this set (73)

Why is normalizing log data important in a centralized logging setup?

Uniformly formatted logs are easier to store and analyze

What type of attacks does a flood guard protect against? Check all that apply.

SYN Floods and DDOS Attacks

What does DHCP Snooping protect against?

Rogue DHCP server attack

What does Dynamic ARP Inspection protect against?

ARP poisoning attacks

What does IP Source Guard protect against?

IP spoofing attacks

What does EAP-TLS use for mutual authentication of both the server and the client?

Digital Certificates

Why is it recommended to use both network-based and host-based firewalls? Check all that apply.

For protection against hosts on the same network

What are some of the weaknesses of the WEP scheme? Check all that apply.

small iv pool size
use rc4 stream cipher

What symmetric encryption algorithm does WPA2 use?

AES

How can you reduce the likelihood of WPS brute-force attacks? Check all that apply

disable wps

Select the most secure WiFi security configuration from below:

WPA2 ENTERPRISE

What does tcpdump do? Select all that apply.

Analyzes packets and provides a textual analysis
Capture packets

What does wireshark do differently from tcpdump? Check all that apply.

It has a graphical interface
understand more application-level protocols

What factors should you consider when designing an IDS installation? Check all that apply.

traffic bandwidth
Storage Capacity

What is the difference between an Intrusion Detection System and an Intrusion Prevention System?

IDS can alert on detected attack traffic, but IPS can actively block attack traffic

What factors would limit your ability to capture packets? Check all that apply.

network interface not been promiscuous or monitor mode
Access to the traffic in question

What traffic would an implicit deny firewall rule block?

Everything not allowed

The process of converting log entry fields into a standard format is called _______.

Log Normalization

A ______ can protect your network from DoS attacks.

Flood Guard

Using different VLANs for different network devices is an example of _______.

Network Separation

How do you protect against rogue DHCP server attacks?

DHCP Snooping

What does Dynamic ARP Inspection protect against?

ARP man-in-the-middle attack

What kind of attack does IP Source Guard protect against?

IP Spoofing Attacks

A reverse proxy is different from a proxy because a reverse proxy provides ______.

Privacy

What underlying symmetric encryption cipher does WEP use?

RC4

What key lengths does WEP encryption support? Check all that apply.

64 AND 128

What's the recommended way to protect a WPA2 network? Check all that apply.

Use long complex passwords
Use a unique SSID

If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture? Check all that apply.

Traffic to and from your machine, Broadcast traffic

What could you use to sniff traffic on a switch?

Port Mirroring

What does tcpdump do?

Performs packet capture and analysis

Compared to tcpdump, wireshark has a much wider range of supported _______.

Protocols

A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.

Triggers alerts

What does a Network Intrusion Prevention System do when it detects an attack?

It blocks the traffic

What is an attack vector?

A mechanism by which an attacker can interact with your network or system.

Disabling unnecessary components serves which purposes? Check all that apply.

Closing Attack Vectors
Reducing the attack surface

What's an attack surface?

The combine sum of all attack vectors in a system or network

A good defense in depth strategy would involve deploying which firewalls?

Both host base firewall and network based firewall

Using a bastion host allows for which of the following? Select all that apply.

Enforcing stricter security measures
Applying more restrictive firewall rules
Having more detailed monitoring and logging

What benefits does centralized logging provide? Check all that apply.

It allows for easier logs analysis
It helps secure logs from tampering or destruction

What are some of the shortcomings of antivirus software today? Check all that apply.

It can't protect against unknown threats

How is binary whitelisting a better option than antivirus software?

it blocks unknown or emerging threats

What does full-disk encryption protect against? Check all that apply.

Data Theft
Tampering with system files

What's the purpose of escrowing a disk encryption key?

Performing data recovery

Why is it important to keep software up-to-date?

To Address security vulnerabilities discovered

What are some types of software that you'd want to have an explicit application policy for? Check all that apply.

File Sharing Program and Video Games

What does a host-based firewall protect against that a network-based one doesn't? Check all that apply.

Protection in untrusted Networks
Protection from compromised peers

What does full-disk encryption protect against? Check all that apply.

Data Tampering
Data Theft

What is a class of vulnerabilities that are unknown before they are exploited?

0-day vulnerabilities

Which of these host-based firewall rules help to permit network access from a Virtual Private Network (VPN) subnet?

Access Control List

Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? Check all that apply.

Antivirus software
Antimalaware measures

What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?

Full Disk Encryption

A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities?

Software patch management

A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections to secure the server from getting compromised by a hacker? Check all that apply.

Secure firewall
Access Control Lists (ACLs)
Bastion hosts

What are some examples of security goals that you may have for an organization? Check all that apply.

To prevent unauthorized access to customer credentials
To protect customer data from unauthorized access

Which of these would you consider high-value targets for a potential attacker? Check all that apply.

Customer credit card information
Authentication databases

What's the purpose of a vulnerability scanner?

detect vulnerabilities on your network or system

What are some restrictions that should apply to sensitive and confidential data? Check all that apply.

It can be stored on encrypted media only

What's a privacy policy designed to guard against?

Misuse or abuse of sensitive data

You're interested in using the services of a vendor company. How would you assess their security capabilities? Check all that apply

Ask them to complete a questionnaire
Ask them to provide any penetration testing or security assessment report.

What's the goal of mandatory IT security training for an organization? Check all that apply.

Educate employees on how to stay secure
Tu build a culture that prioritizes security

What's the first step in handling an incident?

Detect the incident

How do you protect against a similar incident occurring again in the future?

Conduct a post-incident analysis

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network?

Vulnerabilities scanner

A strong password is a good step towards good security, but what else is recommended to secure authentication?

2-factor authentication

What's a quick and effective way of evaluating a third party's security?

A security assessment questionnaire

How can events be reconstructed after an incident?

reviewing and analyzing logs

A company wants to restrict access to sensitive data. Only those who have a "need to know" will have access to this data. Strong access controls need to be implemented. Which of these examples, that don't include user identification, are used for 2-factor authentication? Check all that apply.

password
u2f token

Which of these are examples of security tools that can scan computer systems and networks for vulnerabilities? Check all that apply.

Qualys
OpenVAS
Nessus

Data handling policies usually forbid the storing of confidential information on which of these devices? Check all that apply.

usb drives
cd drives

What are some ways to combat against email phishing attacks for user passwords? Check all that apply.

Spam filter
User Education

Third-party services that require equipment on-site may require your company to do which of the following? Check all that apply.

evaluate hardware
additional monitoring via firewall
provide remote access
report any issues

Periodic mandatory security training courses can be given to employees in what way? Check all that apply.

short video
Brief quiz

Once the scope of the incident is determined, the next step would be _____.

containment

Sets with similar terms

Security Fundamentals 98-367: Lesson 4

47 terms

riday95

Security Fundamentals 98-367: Lesson 4

47 terms

CDOBambu

SY0-401:3 TS Quiz Threats and Vulnerabilities

96 terms

Berevan_Omer

Network+ Chapter 8

30 terms

zaidhabibi

Sets found in the same folder

IT Security: Defense against the digital dark arts…

27 terms

snramos10

IT Security: Defense against the digital dark arts…

20 terms

snramos10

Week 3 - AAA Security (Not Roadside Assistance)

33 terms

heathersisson

WEEK 6 :: GRADED ASSESSMENT :: Creating a Company…

31 terms

dojikerze

Other sets by this creator

IT Security: Defense against the digital dark arts…

27 terms

vhs81

IT Security: Defense against the digital dark arts…

26 terms

vhs81

Understanding Security Threats

13 terms

vhs81

Network+ N10-007

9 terms

vhs81

Other Quizlet sets

Unit 4 Regulatory systems

43 terms

MdM6159

Exam 1

39 terms

gioisabucket

HIST ppl test 2

11 terms

annaflaherty16

Bio lecture final

21 terms

rw03900

Related questions

QUESTION

What box would you check in the Windows Vista Map Network Drive dialog box to reconnect a mapped network folder at logon?

6 answers

QUESTION

45. (421) When considering the factor of service area for commercial satellite services, which description about Ku-band service is true?

7 answers

QUESTION

Which technology would be the best choice for authenticating wireless users to a RADIUS server?

4 answers

QUESTION

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

15 answers

5 Tips on Ways to Improve WPA2 Security.
Keep your devices patched and up to date. ... .
Use strong and unique passwords with a greater password length. ... .
Ensure that no default credentials are used on any of the access points (such as admin credentials on a router)..

What does IP source guard protect against?

IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings. This feature helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.

What does a host

Definition. A host-based firewall is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only. They can prevent a host from becoming infected and stop infected hosts from spreading malware to other hosts.

What does DHCP snooping protect against?

The DHCP snooping feature determines whether traffic sources are trusted or untrusted. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, the DHCP snooping feature filters messages and rate-limits traffic from untrusted sources.