Deck 12: Network Security

Full screen (f)
exit full mode
Question
Which is not a stage of forensics examination?

A)Review
B)Analysis
C)Containment
D)Collection
Use Space or
up arrow
down arrow
to flip the card.
Question
The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem

A)Check the source and destination IP address of the tunnel configured on the router.
B)Make sure the IP addresses on the ends of the tunnel are not in the same subnet.
C)Make sure the IP addresses on the ends of the tunnel are in the same subnet.
D)Use the show access-list command to verify the routers are properly configured.
Question
An attacker to a network is using social engineering to attack a network.This means which of the following

A)The attacker claims to be from network support.
B)The attacker is sifting through discarded trash.
C)The attacker uses a dictionary attack.
D)The attacker uses packet sniffing.
Question
A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat

A)Use access lists to allow only sources from the network to enter the router's interfaces.
B)Set up a spoofing account so that the attacker doesn't know which machine to attack.
C)There isn't a way to reduce this threat.
D)Configure the router to block directed broadcasts to the network.
E)Prevent intrusions.
Question
Where might you place servers that require access from the public network?

A)A test lab
B)A safe zone
C)A DMZ
D)A protected hub
Question
Why would a network administrator configure access lists to filter data packets on a routers interface?

A)This is a last choice because viruses are transported via the Internet.
B)This is a good step,but packets should be avoided when configuring access lists.
C)This technique helps to minimize data spikes.
D)This can be used to limit data packets that enter the network.
Question
When would a network administrator use L2TP?

A)When configuring routing for a network
B)When configuring a remote user's tunneling protocol
C)To block ICMP packets from coming into a network
D)To help with packet filtering
Question
What ACL entry would eliminate the effect of the implicit deny?

A)permit ip any any
B)permit all
C)permit any
D)permit traffic all
Question
The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?

A)No,the SSH connection is fully encrypted and this cannot be decoded.
B)Yes,the SSH connection is not very strong and parts are in plain text.
C)No,the time required to decode the SSH is too lengthy to be a threat.
D)Yes,the network administrator should be concerned if someone is suspected of having internal access.
Question
A dictionary attack is being used by an attacker to break into a network.What does this mean?

A)The attacker is using a secret list of code words.
B)The attacker is using only uppercase letters for common words.
C)The attacker is using only lowercase letter for unknown words.
D)The attacker is using known passwords and many variations of upper- and lowercase combinations.
E)All of these answers are correct.
Question
Which of the following is a Linux-based port scanner that is now ported to most all operating systems?

A)SNMP
B)TRACE
C)NMAP
D)ICMP
Question
What wireless security technology replaces WEP as the main security mechanism?

A)WPA
B)WEP2
C)SSID
D)MACSEC
Question
There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?

A)Convert all operating systems to Linux.
B)Make sure antivirus software is installed with the most current version.
C)Use a personal firewall.
D)Use firewall software that permits only trusted sites.
Question
The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following

A)This system will provide IP address information of all possible threats in the network.
B)This system will monitor data packets passing through the network and identify potential attacks.
C)This system will cut down any unnecessary TCP data traffic and convert it to UDP.
D)This system will potentially catch ongoing attacks.
Question
A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?

A)The purpose of the firewall is to hide the file server from the outside but still allow traffic to pass to the outside and back.The firewall must be stateful so that it keeps track of data packet flow.
B)The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back.The firewall should not be stateful unless the file server is not secure.
C)The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back.The firewall must be stateful so that it keeps track of data packet flow.
D)The purpose of the firewall is to hide the file server from the inside but allow traffic to pass to the outside.The firewall must be stateful so that it keeps track of data packet flow.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/15
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Network Security
1
Which is not a stage of forensics examination?

A)Review
B)Analysis
C)Containment
D)Collection
C
2
The network administrator configures a VPN tunnel from a remote office to the main facility.A problem has occurred in the link.Which are the main steps the administrator should take to resolve the problem

A)Check the source and destination IP address of the tunnel configured on the router.
B)Make sure the IP addresses on the ends of the tunnel are not in the same subnet.
C)Make sure the IP addresses on the ends of the tunnel are in the same subnet.
D)Use the show access-list command to verify the routers are properly configured.
A,C
3
An attacker to a network is using social engineering to attack a network.This means which of the following

A)The attacker claims to be from network support.
B)The attacker is sifting through discarded trash.
C)The attacker uses a dictionary attack.
D)The attacker uses packet sniffing.
A,B
4
A network administrator is concerned that the network is vulnerable to a denial-of-service attack.What steps should be taken to reduce this threat

A)Use access lists to allow only sources from the network to enter the router's interfaces.
B)Set up a spoofing account so that the attacker doesn't know which machine to attack.
C)There isn't a way to reduce this threat.
D)Configure the router to block directed broadcasts to the network.
E)Prevent intrusions.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
5
Where might you place servers that require access from the public network?

A)A test lab
B)A safe zone
C)A DMZ
D)A protected hub
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
6
Why would a network administrator configure access lists to filter data packets on a routers interface?

A)This is a last choice because viruses are transported via the Internet.
B)This is a good step,but packets should be avoided when configuring access lists.
C)This technique helps to minimize data spikes.
D)This can be used to limit data packets that enter the network.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
7
When would a network administrator use L2TP?

A)When configuring routing for a network
B)When configuring a remote user's tunneling protocol
C)To block ICMP packets from coming into a network
D)To help with packet filtering
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
8
What ACL entry would eliminate the effect of the implicit deny?

A)permit ip any any
B)permit all
C)permit any
D)permit traffic all
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
9
The network administrator suspects that packet sniffing is being used to capture data packets in the network.The network administrator is using an SSH connection for all critical applications,and switches are being used on all network connections.Should the network administrator be concerned?

A)No,the SSH connection is fully encrypted and this cannot be decoded.
B)Yes,the SSH connection is not very strong and parts are in plain text.
C)No,the time required to decode the SSH is too lengthy to be a threat.
D)Yes,the network administrator should be concerned if someone is suspected of having internal access.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
10
A dictionary attack is being used by an attacker to break into a network.What does this mean?

A)The attacker is using a secret list of code words.
B)The attacker is using only uppercase letters for common words.
C)The attacker is using only lowercase letter for unknown words.
D)The attacker is using known passwords and many variations of upper- and lowercase combinations.
E)All of these answers are correct.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a Linux-based port scanner that is now ported to most all operating systems?

A)SNMP
B)TRACE
C)NMAP
D)ICMP
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
12
What wireless security technology replaces WEP as the main security mechanism?

A)WPA
B)WEP2
C)SSID
D)MACSEC
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
13
There is a new virus reported on the Internet.What steps should the network administrator take to protect the network from the threat?

A)Convert all operating systems to Linux.
B)Make sure antivirus software is installed with the most current version.
C)Use a personal firewall.
D)Use firewall software that permits only trusted sites.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
14
The network management is concerned about intrusion problems.The network administrator recommends intrusion detection be placed on the network.This will do which of the following

A)This system will provide IP address information of all possible threats in the network.
B)This system will monitor data packets passing through the network and identify potential attacks.
C)This system will cut down any unnecessary TCP data traffic and convert it to UDP.
D)This system will potentially catch ongoing attacks.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
15
A network administrator is considering placing a firewall on an internal file server in the network.What is the purpose of the firewall,and is it important for the firewall to be stateful?

A)The purpose of the firewall is to hide the file server from the outside but still allow traffic to pass to the outside and back.The firewall must be stateful so that it keeps track of data packet flow.
B)The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back.The firewall should not be stateful unless the file server is not secure.
C)The purpose of the firewall is to protect the file server from the outside but still allow traffic to pass to the outside and back.The firewall must be stateful so that it keeps track of data packet flow.
D)The purpose of the firewall is to hide the file server from the inside but allow traffic to pass to the outside.The firewall must be stateful so that it keeps track of data packet flow.
Unlock Deck
Unlock for access to all 15 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 15 flashcards in this deck.