Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT
Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Quiz
Terms in this set (73)
Why is normalizing log data important in a centralized logging setup?
Uniformly formatted logs are easier to store and analyze
What type of attacks does a flood guard protect against? Check all that apply.
SYN Floods and DDOS Attacks
What does DHCP Snooping protect against?
Rogue DHCP server attack
What does Dynamic ARP Inspection protect against?
ARP poisoning attacks
What does IP Source Guard protect against?
IP spoofing attacks
What does EAP-TLS use for mutual authentication of both the server and the client?
Digital Certificates
Why is it recommended to use both network-based and host-based firewalls? Check all that apply.
For protection against hosts on the same network
What are some of the weaknesses of the WEP scheme? Check all that apply.
small iv pool size
use rc4 stream cipher
What symmetric encryption algorithm does WPA2 use?
AES
How can you reduce the likelihood of WPS brute-force attacks? Check all that apply
disable wps
Select the most secure WiFi security configuration from below:
WPA2 ENTERPRISE
What does tcpdump do? Select all that apply.
Analyzes packets and provides a textual analysis
Capture packets
What does wireshark do differently from tcpdump? Check all that apply.
It has a
graphical interface
understand more application-level protocols
What factors should you consider when designing an IDS installation? Check all that apply.
traffic bandwidth
Storage Capacity
What is the difference between an Intrusion Detection System and an Intrusion Prevention System?
IDS can alert on detected attack traffic, but IPS can actively block attack traffic
What factors would limit your ability to capture packets? Check all that apply.
network interface not been promiscuous or monitor mode
Access to the traffic in question
What traffic would an implicit deny firewall rule block?
Everything not allowed
The process of converting log entry fields into a standard format is called _______.
Log Normalization
A ______ can protect your network from DoS attacks.
Flood Guard
Using different VLANs for different network devices is an example of _______.
Network Separation
How do you protect against rogue DHCP server attacks?
DHCP Snooping
What does Dynamic ARP Inspection protect against?
ARP man-in-the-middle attack
What kind of attack does IP Source Guard protect against?
IP Spoofing Attacks
A reverse proxy is different from a proxy because a reverse proxy provides ______.
Privacy
What underlying symmetric encryption cipher does WEP use?
RC4
What key lengths does WEP encryption support? Check all that apply.
64 AND 128
What's the recommended way to protect a WPA2 network? Check all that apply.
Use long complex passwords
Use a unique SSID
If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture? Check all that apply.
Traffic to and from your machine, Broadcast traffic
What could you use to sniff traffic on a switch?
Port Mirroring
What does tcpdump do?
Performs packet capture and analysis
Compared to tcpdump, wireshark has a much wider range of supported _______.
Protocols
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
Triggers alerts
What does a Network Intrusion Prevention System do when it detects an attack?
It blocks the traffic
What is an attack vector?
A mechanism by which an attacker can interact with your network or system.
Disabling unnecessary components serves which purposes? Check all that apply.
Closing Attack Vectors
Reducing the attack surface
What's an attack surface?
The combine sum of all attack vectors in a system or network
A good defense in depth strategy would involve deploying which firewalls?
Both host base firewall and network based firewall
Using a bastion host allows for which of the following? Select all that apply.
Enforcing stricter security measures
Applying more restrictive firewall rules
Having more detailed monitoring and logging
What benefits does centralized logging provide? Check all that apply.
It allows for easier logs analysis
It helps secure logs from tampering or destruction
What are some of the shortcomings of antivirus software today? Check all that apply.
It can't protect against unknown threats
How is binary whitelisting a better option than antivirus software?
it blocks unknown or emerging threats
What does full-disk encryption protect against? Check all that apply.
Data Theft
Tampering with system files
What's the purpose of escrowing a disk encryption key?
Performing data recovery
Why is it important to keep software up-to-date?
To Address security vulnerabilities discovered
What are some types of software that you'd want to have an explicit application policy for? Check all that apply.
File Sharing Program and Video Games
What does a host-based firewall protect against that a network-based one doesn't? Check all that apply.
Protection in untrusted Networks
Protection from compromised peers
What does full-disk encryption protect against? Check all that apply.
Data Tampering
Data Theft
What is a class of vulnerabilities that are unknown before they are exploited?
0-day vulnerabilities
Which of these host-based firewall rules help to permit network access from a Virtual Private Network (VPN) subnet?
Access Control List
Which of these plays an important role in keeping attack traffic off your systems and helps to protect users? Check all that apply.
Antivirus software
Antimalaware
measures
What can provide resilience against data theft, and can prevent an attacker from stealing confidential information from a hard drive that was stolen?
Full Disk Encryption
A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities?
Software patch management
A core authentication server is exposed to the internet and is connected to sensitive services. How can you restrict connections to secure the server from getting compromised by a hacker? Check all that apply.
Secure firewall
Access Control Lists (ACLs)
Bastion hosts
What are some examples of security goals that you may have for an organization? Check all that apply.
To prevent unauthorized access to customer credentials
To protect customer data from unauthorized access
Which of these would you consider high-value targets for a potential attacker? Check all that apply.
Customer credit card information
Authentication
databases
What's the purpose of a vulnerability scanner?
detect vulnerabilities on your network or system
What are some restrictions that should apply to sensitive and confidential data? Check all that apply.
It can be stored on encrypted media only
What's a privacy policy designed to guard against?
Misuse or abuse of sensitive data
You're interested in using the services of a vendor company. How would you assess their security capabilities? Check all that apply
Ask them to complete a questionnaire
Ask them to provide any penetration testing or security assessment report.
What's the goal of mandatory IT security training for an organization? Check all that apply.
Educate employees on how to stay secure
Tu build a culture that prioritizes security
What's the first step in handling an incident?
Detect the incident
How do you protect against a similar incident occurring again in the future?
Conduct a post-incident analysis
What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network?
Vulnerabilities scanner
A strong password is a good step towards good security, but what else is recommended to secure authentication?
2-factor authentication
What's a quick and effective way of evaluating a third party's security?
A security assessment questionnaire
How can events be reconstructed after an incident?
reviewing and analyzing logs
A company wants to restrict access to sensitive data. Only those who have a "need to know" will have access to this data. Strong access controls need to be implemented. Which of these examples, that don't include user identification, are used for 2-factor authentication? Check all that apply.
password
u2f token
Which of these are examples of security tools that can scan computer systems and networks for vulnerabilities? Check all that apply.
Qualys
OpenVAS
Nessus
Data handling policies usually forbid the storing of confidential information on which of these devices? Check all that apply.
usb drives
cd drives
What are some ways to combat against email phishing attacks for user passwords? Check all that apply.
Spam filter
User Education
Third-party services that require equipment on-site may require your company to do which of the following? Check all that apply.
evaluate hardware
additional monitoring via firewall
provide remote access
report any issues
Periodic mandatory security training courses can be given to employees in what way? Check all that apply.
short video
Brief quiz
Once the scope of the incident is determined, the next step would be _____.
containment
Sets with similar termsSecurity Fundamentals 98-367: Lesson 4
47 terms
riday95
Security Fundamentals 98-367: Lesson 4
47 terms
CDOBambu
SY0-401:3 TS Quiz Threats and Vulnerabilities
96 terms
Berevan_Omer
Network+ Chapter 8
30 terms
zaidhabibi
Sets found in the same folderIT Security: Defense against the digital dark arts…
27 terms
snramos10
IT Security: Defense against the digital dark arts…
20 terms
snramos10
Week 3 - AAA Security (Not Roadside Assistance)
33 terms
heathersisson
WEEK 6 :: GRADED ASSESSMENT :: Creating a Company…
31 terms
dojikerze
Other sets by this creatorIT Security: Defense against the digital dark arts…
27 terms
vhs81
IT Security: Defense against the digital dark arts…
26 terms
vhs81
Understanding Security Threats
13 terms
vhs81
Network+ N10-007
9 terms
vhs81
Other Quizlet setsUnit 4 Regulatory systems
43 terms
MdM6159
Exam 1
39 terms
gioisabucket
HIST ppl test 2
11 terms
annaflaherty16
Bio lecture final
21 terms
rw03900
Related questionsQUESTION
What box would you check in the Windows Vista Map Network Drive dialog box to reconnect a mapped network folder at logon?
6 answers
QUESTION
45. (421) When considering the factor of service area for commercial satellite services, which description about Ku-band service is true?
7 answers
QUESTION
Which technology would be the best choice for authenticating wireless users to a RADIUS server?
4 answers
QUESTION
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?
15 answers