Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Quiz Terms in this set (73)Why is normalizing log data important in a centralized logging setup? Uniformly formatted logs are easier to store and analyze What type of attacks does a flood guard protect against? Check all that apply. SYN Floods and DDOS Attacks What does DHCP Snooping protect against? Rogue DHCP server attack What does Dynamic ARP Inspection protect against? ARP poisoning attacks What does IP Source Guard protect against? IP spoofing attacks What does EAP-TLS use for mutual authentication of both the server and the client? Digital Certificates Why is it recommended to use both network-based and host-based firewalls? Check all that apply. For protection against hosts on the same network What are some of the weaknesses of the WEP scheme? Check all that apply. small iv pool size What symmetric encryption algorithm does WPA2 use? AES How can you reduce the likelihood of WPS brute-force attacks? Check all that apply disable wps
Select the most secure WiFi security configuration from below: WPA2 ENTERPRISE What does tcpdump do? Select all that apply. Analyzes packets and provides a textual analysis What does wireshark do differently from tcpdump? Check all that apply. It has a
graphical interface What factors should you consider when designing an IDS installation? Check all that apply. traffic bandwidth What is the difference between an Intrusion Detection System and an Intrusion Prevention System? IDS can alert on detected attack traffic, but IPS can actively block attack traffic What factors would limit your ability to capture packets? Check all that apply. network interface not been promiscuous or monitor mode What traffic would an implicit deny firewall rule block? Everything not allowed The process of converting log entry fields into a standard format is called _______. Log Normalization A ______ can protect your network from DoS attacks. Flood Guard Using different VLANs for different network devices is an example of _______. Network Separation How do you protect against rogue DHCP server attacks? DHCP Snooping What does Dynamic ARP Inspection protect against? ARP man-in-the-middle attack What kind of attack does IP Source Guard protect against? IP Spoofing Attacks A reverse proxy is different from a proxy because a reverse proxy provides ______. Privacy What underlying symmetric encryption cipher does WEP use? RC4 What key lengths does WEP encryption support? Check all that apply. 64 AND 128 What's the recommended way to protect a WPA2 network? Check all that apply. Use long complex passwords If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture? Check all that apply. Traffic to and from your machine, Broadcast traffic What could you use to sniff traffic on a switch? Port Mirroring What does tcpdump do? Performs packet capture and analysis Compared to tcpdump, wireshark has a much wider range of supported _______. Protocols A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack. Triggers alerts What does a Network Intrusion Prevention System do when it detects an attack? It blocks the traffic What is an attack vector? A mechanism by which an attacker can interact with your network or system. Disabling unnecessary components serves which purposes? Check all that apply. Closing Attack Vectors What's an attack surface? The combine sum of all attack vectors in a system or network A good defense in depth strategy would involve deploying which firewalls? Both host base firewall and network based firewall Using a bastion host allows for which of the following? Select all that apply. Enforcing stricter security measures What benefits does centralized logging provide? Check all that apply. It allows for easier logs analysis What are some of the shortcomings of antivirus software today? Check all that apply. It can't protect against unknown threats How is binary whitelisting a better option than antivirus software? it blocks unknown or emerging threats What does full-disk encryption protect against? Check all that apply. Data Theft What's the purpose of escrowing a disk encryption key? Performing data recovery Why is it important to keep software up-to-date? To Address security vulnerabilities discovered What are some types of software that you'd want to have an explicit application policy for? Check all that apply. File Sharing Program and Video Games What does a host-based firewall protect against that a network-based one doesn't? Check all that apply. Protection in untrusted Networks What does full-disk encryption protect against? Check all that apply. Data Tampering What is a class of vulnerabilities that are unknown before they are exploited? 0-day vulnerabilities Which of these host-based firewall rules help to permit network access from a Virtual Private Network (VPN) subnet? Access Control List Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? Check all that apply. Antivirus software What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen? Full Disk Encryption A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities? Software patch management A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections to secure the server from getting compromised by a hacker? Check all that apply. Secure firewall What are some examples of security goals that you may have for an organization? Check all that apply. To prevent unauthorized access to customer credentials Which of these would you consider high-value targets for a potential attacker? Check all that apply. Customer credit card information What's the purpose of a vulnerability scanner? detect vulnerabilities on your network or system What are some restrictions that should apply to sensitive and confidential data? Check all that apply. It can be stored on encrypted media only What's a privacy policy designed to guard against? Misuse or abuse of sensitive data You're interested in using the services of a vendor company. How would you assess their security capabilities? Check all that apply Ask them to complete a questionnaire What's the goal of mandatory IT security training for an organization? Check all that apply. Educate employees on how to stay secure What's the first step in handling an incident? Detect the incident How do you protect against a similar incident occurring again in the future? Conduct a post-incident analysis What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network? Vulnerabilities scanner A strong password is a good step towards good security, but what else is recommended to secure authentication? 2-factor authentication
What's a quick and effective way of evaluating a third party's security? A security assessment questionnaire How can events be reconstructed after an incident? reviewing and analyzing logs A company wants to restrict access to sensitive data. Only those who have a "need to know" will have access to this data. Strong access controls need to be implemented. Which of these examples, that don't include user identification, are used for 2-factor authentication? Check all that apply. password Which of these are examples of security tools that can scan computer systems and networks for vulnerabilities? Check all that apply. Qualys Data handling policies usually forbid the storing of confidential information on which of these devices? Check all that apply. usb drives What are some ways to combat against email phishing attacks for user passwords? Check all that apply. Spam filter Third-party services that require equipment on-site may require your company to do which of the following? Check all that apply. evaluate hardware Periodic mandatory security training courses can be given to employees in what way? Check all that apply. short video Once the scope of the incident is determined, the next step would be _____. containment Sets with similar termsSecurity Fundamentals 98-367: Lesson 447 terms riday95 Security Fundamentals 98-367: Lesson 447 terms CDOBambu SY0-401:3 TS Quiz Threats and Vulnerabilities96 terms Berevan_Omer Network+ Chapter 830 terms zaidhabibi Sets found in the same folderIT Security: Defense against the digital dark arts…27 terms snramos10 IT Security: Defense against the digital dark arts…20 terms snramos10 Week 3 - AAA Security (Not Roadside Assistance)33 terms heathersisson WEEK 6 :: GRADED ASSESSMENT :: Creating a Company…31 terms dojikerze Other sets by this creatorIT Security: Defense against the digital dark arts…27 terms vhs81 IT Security: Defense against the digital dark arts…26 terms vhs81 Understanding Security Threats13 terms vhs81 Network+ N10-0079 terms vhs81 Other Quizlet setsUnit 4 Regulatory systems43 terms MdM6159 Exam 139 terms gioisabucket HIST ppl test 211 terms annaflaherty16 Bio lecture final21 terms rw03900 Related questionsQUESTION What box would you check in the Windows Vista Map Network Drive dialog box to reconnect a mapped network folder at logon? 6 answers QUESTION 45. (421) When considering the factor of service area for commercial satellite services, which description about Ku-band service is true? 7 answers QUESTION Which technology would be the best choice for authenticating wireless users to a RADIUS server? 4 answers QUESTION A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? 15 answers What's the recommended way to protect a WPA2?5 Tips on Ways to Improve WPA2 Security. Keep your devices patched and up to date. ... . Use strong and unique passwords with a greater password length. ... . Ensure that no default credentials are used on any of the access points (such as admin credentials on a router).. What does IP source guard protect against?IP Source Guard is a security feature that restricts IP traffic on untrusted Layer 2 ports by filtering traffic based on the DHCP snooping binding database or manually configured IP source bindings. This feature helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.
What does a hostDefinition. A host-based firewall is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only. They can prevent a host from becoming infected and stop infected hosts from spreading malware to other hosts.
What does DHCP snooping protect against?The DHCP snooping feature determines whether traffic sources are trusted or untrusted. An untrusted source may initiate traffic attacks or other hostile actions. To prevent such attacks, the DHCP snooping feature filters messages and rate-limits traffic from untrusted sources.
|