Chapter 13 Network Pro practice exams

question
You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two
answer
Apply all patches and updates Change default account password
question
As a victim of a Smurf attack, what protection measure is the most effective during the attack?
answer
Communication with our upstream provider
question
Which of the following attacks tries to associate an incorrect MAC address with a know IP address?
answer
ARP poisoning
question
Which of the following best describes the Ping of Death exploit?
answer
An ICMP packet larger than 65,536 bytes?
question
Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer?
answer
ARP poisoning
question
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two
answer
Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP
question
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two
answer
L2TP PPTP
question
IPsec is implemented through two separate protocols. What are these protocols called? select two
answer
AH ESP
question
Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?
answer
IPsec
question
Which of the following statements about SSL VPN are true? select two
answer
Uses port 443 Encrypts the entire communication session
question
Which of the following can route layer 3 protocols across an IP network?
answer
GRE
question
You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
answer
Your copy is the same as the copy posted on the website
question
Which of the following network devices or services prevents the use of IPsec in most cases?
answer
NAT
question
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client?
answer
Implement a hardware checkout policy
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following are solutions that address physical security?(Select two)
answer
Require identification and name badges for all employees //Escort visitors at all times
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.
answer
Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Antipassback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier
question
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which securityrelated recommendations should you make to this client? (Select two.)
answer
Control access to the work area with locking doors and proximity readers. //Relocate the switch to the locked server closet.
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
Which of the following are examples of social engineering?
answer
Dumpster diving //Shoulder surfing
question
How can an organization help prevent social engineering attacks?
answer
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
question
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?
answer
Phishing
question
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?
answer
Whaling
question
Which of the following is a common form of social engineering attack?
answer
Hoax virus information e-mails
question
Which of the following is not a form of social engineering?
answer
Impersonating a user by logging on with stolen credentials
question
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
Establish and enforce a document destruction policy
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Match the social engineering description on the left with the appropriate attack type on the right.
answer
Phishing -An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling -An attacker gathers personal information about the target individual, who is a CEO. Spear phishing -An attacker gathers personal information about the target individual in an organization. Dumpster diving -An attacker searches through an organization's trash for sensitive information. Piggybacking -An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing -An attacker uses a telephone to convince target individuals to reveal their credit card
question
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
answer
Social validation
question
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
answer
Vishing
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH.
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.
answer
SSL
question
Which protocol does HTTPS use to offer greater security for Web transactions?
answer
SSL.
question
You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)
answer
SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two.)
answer
Secure Sockets Layer Transport Layer Security
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
answer
TLS// SSL
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication.
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
answer
TACACS+ RADIUS
question
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
answer
EAP
question
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
answer
Obtain a certificate from a public PKI
question
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
answer
Time server Ticket granting server
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configurations?
answer
Configure the remote access server as RADIUS clients
question
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?
answer
802.1x
question
Which of the following features of MS-CHAP v2 that is not included in CHAP?
answer
Mutual authentications
question
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
answer
Username
question
Which of the following is the strongest form of multi-factor authentications?
answer
A password, a biometric scan, and a token device
question
Which of the following is an example of two-factor authentications?
answer
A token device and a pin
question
Which of the following is an example of three-factor authentication?
answer
Token device, keystroke analysis, cognitive question
question
Which of the following are examples of Type 2 authentication credentials? select two
answer
Smart card Photo ID
question
Match the authentication factor types on the left with the appropriate authentication factor on the right.
answer
Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do
question
which of the following attacks, if successful, causes a switch to function like a hub?
answer
MAC flooding
question
You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
answer
Client-side scripts
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires and ID card to gain access...What should you do to increase the security of this device?
answer
Use a stronger administrative password
question
Which of the following is a text file provided by a website to a client that is stored on a user's hard drive in order to track and record information about the user?
answer
Cookie
question
When you browse to a website, a pop-up window tells you that your computer has been infected with a virus...spyware on your system.
answer
Drive-by download
question
While using a web-based order form...The value entered is large enough to exceed the maximum value...A large sum of money. What type of attack has occurred in this scenario?
answer
Integer overflow
question
In a variation of the brute force attack, an attacker may use a predefined list...best addresses this issue?
answer
A strong password policy
question
Which of the following attacks is a form of software exploitation...input variable is designed to handle?
answer
Buffer overflow
question
You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter thefacility a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the orgnaizations servers are kept in a locked closet. An access card is required to enter the server closet She infroms you that the server backups are configured to run each night. A rotation of tapes are used as the backup media You notice the orgnaiation's network switch is kept in the server closet You notice that the router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. The office manager information you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the rpocess. You carry the workstation to our car and bring it back to your office to work on it. What securityrelated recommendations should you make to the client?
answer
Implement a hardware checkout policy
question
Which of the following are solutions that address physical security?
answer
Escort visitors at all times Require identification and name badges for all employees
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a man trap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control with the appropriate example:
answer
Hardened carrier: Protected cable distribution Biometric authentication: Door locks Barricades: Perimeter barrier Emergency escape plans: Safety Alarmed carrier: Protected cable distribution Anti-passback system: Physical access control Emergency lighting: Safety Exterior floodlights: Perimeter barrier
question
You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured with a cable lock. The office manager infroms you that the organizations servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that the server backups are configured to run each night. A rotation of external usb hard drisks are used a backup media You notice the orgnaization's network switch is kept in an empty cubicle adjacent to the office managers workspace You notice that a router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. Which security related recommendations should you make to this client?
answer
Relocate the switch to the locked server closet Control access to the work area with locking doors and card readers
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer using an SSH client with the user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
Which of the following statements about the use of anti-virus software is correct?
answer
Anti-virus software should be configured to download updated virus definition files assoon as they become available.soon as they become
question
You have installed anti-virus software on the computers on your network. You update thedefinition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware?(Select two.)
answer
Schedule regular full system scans. Educate users about malware.
question
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This isan example of which kind of attack?an example of which kind of attack
answer
DDoS
question
Which of the following is the best countermeasure against man-in-the middle attacks?
answer
IPsec
question
A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?
answer
Botnet
question
Which of the following describes a logic bomblogic bomb?
answer
A program that performs a malicious activity at a specific time or after a triggering event
question
Which of the following are characteristics of a rootkitrootkit? (Select two.)
answer
Hides itself from detection Requires administrator-level privileges for installation
question
Which of the following best describes spyware?
answer
It monitors the actions you take on your machine and sends the information back to itsoriginating source.
question
A relatively new employee in the data entry cubical farm was assigned a user account similar tothat of all of the other data entry employees. However, audit logs have shown that this useraccount has been used to change ACLs on several confidential files and has accessed data inaccount has been used to change This situation indicates which of the following has occurred?
answer
Privilege escalation
question
What are the most common network traffic packets captured and used in a replay attack?
answer
Authentication
question
Which of the following are denial of service attacks? (Select two.)
answer
Smurf Fraggle
question
An attacker uses an exploit to push a modified hosts file to client systems. This hosts fileredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andfinancial information.financial information. What kind of exploit has been used in this scenario?
answer
Pharming DNS poisining
question
Users in your organization receive email messages informing them that suspicious activity hasbeen detected on their bank account. They are directed to click a link in the email to verify theirbeen detected on their bank account. They are directed to click a link in the email to verify theironline banking username and password. The URL in the link is in the .ru top-level DNS domain.online banking username and password. What kind of attack has occurred?
answer
Phishing
question
A programmer that fails to check the length of input before processing leaves his codevulnerable to what form of common attack?
answer
Buffer overflow
question
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client?
answer
Implement a hardware checkout policy
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following are solutions that address physical security?(Select two)
answer
Require identification and name badges for all employees //Escort visitors at all times
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.
answer
Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Antipassback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier
question
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which securityrelated recommendations should you make to this client? (Select two.)
answer
Control access to the work area with locking doors and proximity readers. //Relocate the switch to the locked server closet.
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
Which of the following are examples of social engineering?
answer
Dumpster diving //Shoulder surfing
question
How can an organization help prevent social engineering attacks?
answer
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
question
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?
answer
Phishing
question
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?
answer
Whaling
question
Which of the following is a common form of social engineering attack?
answer
Hoax virus information e-mails
question
Which of the following is not a form of social engineering?
answer
Impersonating a user by logging on with stolen credentials
question
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
Establish and enforce a document destruction policy
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Match the social engineering description on the left with the appropriate attack type on the right.
answer
Phishing -An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling -An attacker gathers personal information about the target individual, who is a CEO. Spear phishing -An attacker gathers personal information about the target individual in an organization. Dumpster diving -An attacker searches through an organization's trash for sensitive information. Piggybacking -An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing -An attacker uses a telephone to convince target individuals to reveal their credit card
question
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
answer
Social validation
question
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
answer
Vishing
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH.
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.
answer
SSL
question
Which protocol does HTTPS use to offer greater security for Web transactions?
answer
SSL.
question
You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)
answer
SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two.)
answer
Secure Sockets Layer Transport Layer Security
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
answer
TLS// SSL
1 of

Unlock all answers in this set

Unlock answers
question
You have just purchased a new network device and are getting ready to connect it to your network. Which of the following should you do to increase its security? select two
answer
Apply all patches and updates Change default account password
question
As a victim of a Smurf attack, what protection measure is the most effective during the attack?
answer
Communication with our upstream provider
question
Which of the following attacks tries to associate an incorrect MAC address with a know IP address?
answer
ARP poisoning
question
Which of the following best describes the Ping of Death exploit?
answer
An ICMP packet larger than 65,536 bytes?
question
Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer?
answer
ARP poisoning
question
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
A salesperson in your organization spent most of her time traveling between customers sites. After a customer visit, she must complete various managerial tasks, such as updating your organizations order database. Because she rarely... many of the things... Which key step should you take when implementing this configurations? select two
answer
Configure the VPN connection to us IPsec Configure the browser to sent HTTPS requests through the VPN connection
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP
question
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the internet? select two
answer
L2TP PPTP
question
IPsec is implemented through two separate protocols. What are these protocols called? select two
answer
AH ESP
question
Which of the following network layer protocols provides authentications and encryptions services for IP based network traffic?
answer
IPsec
question
Which of the following statements about SSL VPN are true? select two
answer
Uses port 443 Encrypts the entire communication session
question
Which of the following can route layer 3 protocols across an IP network?
answer
GRE
question
You have just downloaded a file. You created a hash of the file and compare it to the hash posted on the website. The two hashes match. What do you know about the file?
answer
Your copy is the same as the copy posted on the website
question
Which of the following network devices or services prevents the use of IPsec in most cases?
answer
NAT
question
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client?
answer
Implement a hardware checkout policy
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following are solutions that address physical security?(Select two)
answer
Require identification and name badges for all employees //Escort visitors at all times
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.
answer
Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Antipassback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier
question
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which securityrelated recommendations should you make to this client? (Select two.)
answer
Control access to the work area with locking doors and proximity readers. //Relocate the switch to the locked server closet.
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
Which of the following are examples of social engineering?
answer
Dumpster diving //Shoulder surfing
question
How can an organization help prevent social engineering attacks?
answer
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
question
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?
answer
Phishing
question
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?
answer
Whaling
question
Which of the following is a common form of social engineering attack?
answer
Hoax virus information e-mails
question
Which of the following is not a form of social engineering?
answer
Impersonating a user by logging on with stolen credentials
question
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
Establish and enforce a document destruction policy
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Match the social engineering description on the left with the appropriate attack type on the right.
answer
Phishing -An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling -An attacker gathers personal information about the target individual, who is a CEO. Spear phishing -An attacker gathers personal information about the target individual in an organization. Dumpster diving -An attacker searches through an organization's trash for sensitive information. Piggybacking -An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing -An attacker uses a telephone to convince target individuals to reveal their credit card
question
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
answer
Social validation
question
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
answer
Vishing
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH.
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.
answer
SSL
question
Which protocol does HTTPS use to offer greater security for Web transactions?
answer
SSL.
question
You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)
answer
SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two.)
answer
Secure Sockets Layer Transport Layer Security
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
answer
TLS// SSL
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication.
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access?
answer
TACACS+ RADIUS
question
You want to implement an authentication method that uses public and private key pairs. Which authentication methods should you use?
answer
EAP
question
You have a web server that will be used for secure transactions for customers who access the website over the internet. The web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
answer
Obtain a certificate from a public PKI
question
Which of the following are used when implementing Kerberos for authentication and authorization? Select two
answer
Time server Ticket granting server
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization. Which of the following would be a required part of your configurations?
answer
Configure the remote access server as RADIUS clients
question
You want to increase security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?
answer
802.1x
question
Which of the following features of MS-CHAP v2 that is not included in CHAP?
answer
Mutual authentications
question
Which of the following identifications and authentication factors are often well-know or easy to discover by others on the same network or system?
answer
Username
question
Which of the following is the strongest form of multi-factor authentications?
answer
A password, a biometric scan, and a token device
question
Which of the following is an example of two-factor authentications?
answer
A token device and a pin
question
Which of the following is an example of three-factor authentication?
answer
Token device, keystroke analysis, cognitive question
question
Which of the following are examples of Type 2 authentication credentials? select two
answer
Smart card Photo ID
question
Match the authentication factor types on the left with the appropriate authentication factor on the right.
answer
Pin Something you know Smartcard something you have Password Something you know Retina scan Something you are Fingerprint scan Something you are Hardware token Something you have User name Something you know Voice récognition Something you are WI-FI triangulation Somewhere you are Typing behaviors Something you do
question
which of the following attacks, if successful, causes a switch to function like a hub?
answer
MAC flooding
question
You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
answer
Client-side scripts
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires and ID card to gain access...What should you do to increase the security of this device?
answer
Use a stronger administrative password
question
Which of the following is a text file provided by a website to a client that is stored on a user's hard drive in order to track and record information about the user?
answer
Cookie
question
When you browse to a website, a pop-up window tells you that your computer has been infected with a virus...spyware on your system.
answer
Drive-by download
question
While using a web-based order form...The value entered is large enough to exceed the maximum value...A large sum of money. What type of attack has occurred in this scenario?
answer
Integer overflow
question
In a variation of the brute force attack, an attacker may use a predefined list...best addresses this issue?
answer
A strong password policy
question
Which of the following attacks is a form of software exploitation...input variable is designed to handle?
answer
Buffer overflow
question
You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter thefacility a receptionist greets you and escorts you through a locked door to the work area where the office manager sits. The office manager informs you that the orgnaizations servers are kept in a locked closet. An access card is required to enter the server closet She infroms you that the server backups are configured to run each night. A rotation of tapes are used as the backup media You notice the orgnaiation's network switch is kept in the server closet You notice that the router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. The office manager information you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the rpocess. You carry the workstation to our car and bring it back to your office to work on it. What securityrelated recommendations should you make to the client?
answer
Implement a hardware checkout policy
question
Which of the following are solutions that address physical security?
answer
Escort visitors at all times Require identification and name badges for all employees
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a man trap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which camera type should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control with the appropriate example:
answer
Hardened carrier: Protected cable distribution Biometric authentication: Door locks Barricades: Perimeter barrier Emergency escape plans: Safety Alarmed carrier: Protected cable distribution Anti-passback system: Physical access control Emergency lighting: Safety Exterior floodlights: Perimeter barrier
question
You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around the facility you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured with a cable lock. The office manager infroms you that the organizations servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that the server backups are configured to run each night. A rotation of external usb hard drisks are used a backup media You notice the orgnaization's network switch is kept in an empty cubicle adjacent to the office managers workspace You notice that a router/firewall/content filter all in one device has been implemented in the server closet to protect the internal network from external attacks. Which security related recommendations should you make to this client?
answer
Relocate the switch to the locked server closet Control access to the work area with locking doors and card readers
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration from your notebook computer using an SSH client with the user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
Which of the following statements about the use of anti-virus software is correct?
answer
Anti-virus software should be configured to download updated virus definition files assoon as they become available.soon as they become
question
You have installed anti-virus software on the computers on your network. You update thedefinition and engine files, and configure the software to update those files every day. What else should you do to protect your systems from malware?(Select two.)
answer
Schedule regular full system scans. Educate users about malware.
question
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This isan example of which kind of attack?an example of which kind of attack
answer
DDoS
question
Which of the following is the best countermeasure against man-in-the middle attacks?
answer
IPsec
question
A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent?
answer
Botnet
question
Which of the following describes a logic bomblogic bomb?
answer
A program that performs a malicious activity at a specific time or after a triggering event
question
Which of the following are characteristics of a rootkitrootkit? (Select two.)
answer
Hides itself from detection Requires administrator-level privileges for installation
question
Which of the following best describes spyware?
answer
It monitors the actions you take on your machine and sends the information back to itsoriginating source.
question
A relatively new employee in the data entry cubical farm was assigned a user account similar tothat of all of the other data entry employees. However, audit logs have shown that this useraccount has been used to change ACLs on several confidential files and has accessed data inaccount has been used to change This situation indicates which of the following has occurred?
answer
Privilege escalation
question
What are the most common network traffic packets captured and used in a replay attack?
answer
Authentication
question
Which of the following are denial of service attacks? (Select two.)
answer
Smurf Fraggle
question
An attacker uses an exploit to push a modified hosts file to client systems. This hosts fileredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andredirects traffic from legitimate tax preparation sites to malicious sites to gather personal andfinancial information.financial information. What kind of exploit has been used in this scenario?
answer
Pharming DNS poisining
question
Users in your organization receive email messages informing them that suspicious activity hasbeen detected on their bank account. They are directed to click a link in the email to verify theirbeen detected on their bank account. They are directed to click a link in the email to verify theironline banking username and password. The URL in the link is in the .ru top-level DNS domain.online banking username and password. What kind of attack has occurred?
answer
Phishing
question
A programmer that fails to check the length of input before processing leaves his codevulnerable to what form of common attack?
answer
Buffer overflow
question
• The office manager informs you that her desktop system will no longer boot and asks you to repair or replace it, recovering as much data as possible in the process. You carry the workstation out to your car and bring it back to your office to work on it. What securityrelated recommendations should you make to this client?
answer
Implement a hardware checkout policy
question
What is a secure doorway that can be used in coordination with a mantrap to allow easy egress from a secured environment but which actively prevents re-entrance through the exit portal?
answer
Turnstiles
question
Which of the following are solutions that address physical security?(Select two)
answer
Require identification and name badges for all employees //Escort visitors at all times
question
Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?
answer
Deploy a mantrap
question
You want to use CCTV to increase the physical security of your building. Which of the following camera types would offer the sharpest image at the greatest distance under the lowest lighting conditions?
answer
500 resolution, 50mm, .05 LUX
question
You want to use CCTV to increase your physical security. You want to be able to remotely control the camera position. Which type of camera should you choose?
answer
PTZ
question
You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
answer
Security guards
question
Which of the following CCTV types would you use in areas with little or no lights?
answer
Infrared
question
Which of the following CCTV camera types lets you adjust the distance that the camera can see?
answer
Varifocal
question
Which of the following controls is an example of a physical access control method?
answer
Locks on doors
question
You have 5 salesmen who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks
question
Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.
answer
Hardened carrier Protected cable distribution Biometric authentication Door locks Barricades Perimeter barrier Emergency escape plans Safety Alarmed carrier Protected cable distribution Antipassback system Physical access control Emergency lighting Safety Exterior floodlights Perimeter barrier
question
• You notice that a router/firewall/content filter UTM device has been implemented in the server closet to protect the internal network from external attacks. Which securityrelated recommendations should you make to this client? (Select two.)
answer
Control access to the work area with locking doors and proximity readers. //Relocate the switch to the locked server closet.
question
Which of the following is the most important thing to do to prevent console access to a network switch?
answer
Keep the switch in a room that uses a cipher lock.
question
You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a cubicle near your office. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using an SSH client with a user name of admin01 and a password of P@ssW0rd. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device?
answer
Move the router to a secure server room
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
Which of the following are examples of social engineering?
answer
Dumpster diving //Shoulder surfing
question
How can an organization help prevent social engineering attacks?
answer
Publish and enforce clearly written security policies //Educate employees on the risks and countermeasures
question
Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this?
answer
Phishing
question
A senior executive reports that she received a suspicious email concerning a sensitive, internal project that is behind production. The email is sent from someone she doesn't know and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?
answer
Whaling
question
Which of the following is a common form of social engineering attack?
answer
Hoax virus information e-mails
question
Which of the following is not a form of social engineering?
answer
Impersonating a user by logging on with stolen credentials
question
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you are to go to a website and enter your username and password at a new website so you can manage your email and spam using the new service. What should you do?
answer
Verify that the email was sent by the administrator and that this new service is legitimate
question
On your way into the back entrance of the building at work one morning, a man dressed as a plumber asks you to let him in so he can "fix the restroom." What should you do?
answer
Direct him to the front entrance and instruct him to check in with the receptionist.
question
Dumpster diving is a low-tech means of gathering information that may be useful in gaining unauthorized access, or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
answer
Establish and enforce a document destruction policy
question
What is the primary difference between impersonation and masquerading?
answer
One is more active, the other is more passive
question
Match the social engineering description on the left with the appropriate attack type on the right.
answer
Phishing -An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. Whaling -An attacker gathers personal information about the target individual, who is a CEO. Spear phishing -An attacker gathers personal information about the target individual in an organization. Dumpster diving -An attacker searches through an organization's trash for sensitive information. Piggybacking -An attacker enters a secured building by following an authorized employee through a secure door without providing identification. Vishing -An attacker uses a telephone to convince target individuals to reveal their credit card
question
Which type of social engineering attack uses peer pressure to persuade someone to help an attacker?
answer
Social validation
question
Which of the following social engineering attacks use Voice over IP (VoIP) to gain sensitive information?
answer
Vishing
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH.
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations.
answer
SSL
question
Which protocol does HTTPS use to offer greater security for Web transactions?
answer
SSL.
question
You can use a variety of methods to manage the configuration of a network router. Match the management option on the right with its corresponding description on the left. (Each option can be used more than once.)
answer
SSL Uses publickey cryptography HTTP Transfers data in clear text SSH Uses publickey cryptography Telnet Transfers data in clear text Console port Cannot be sniffed
question
Telnet is inherently insecure because its communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
Which security protocols use RSA encryption to secure communications over an untrusted network? (Select two.)
answer
Secure Sockets Layer Transport Layer Security
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two.)
answer
TLS// SSL
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New