Flashcards About Chapter 7 & 8

Unlock all answers in this set

Unlock answers
 
question
You manage a network with a single switch. All hosts connect to the network through the switch. You want to increase the security of devices that are part of the accounting department. You want to make sure Broadcast traffic sent by an accounting computer is only received by other accounting computers, and you want to implement ACLs to control traffic sent to accounting computers through the network. What should you do?
answer
Use a router to configure a subnet for the accounting computers.
question
Which of the following is an advantage of using switches to create virtual LANs?
answer
Broadcast traffic travels to a subset of devices rather than to all devices on the network.
question
Which of the following devise does not examine the MAC address in a frame before process or forwarding the frame?
answer
HUB
question
Which characteristic of a switch can improve bandwidth utilization and reduce the risk of sniffing attack on the network?
answer
A switch filters port traffic based on MAC address.
question
You want to reduce collisions by creating separate collision domains and virtual LANs. Which of the following devices should you choose?
answer
Switch
question
What characteristic of hubs poses a security threat?
answer
Hubs transmit frames to all hosts on all ports.
question
An attacker has obtained the logon credential for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions?
answer
Privilege escalation
question
A relatively new employee in the data entry cubical farm was assigned a user account similar to that of all of the other data entry employees. However, audit logs have shown that this user account has been used to change ACLs on several confidential files and has accessed data in restricted areas. This situation indicates which of the following has occurred?
answer
Privilege escalation
question
Which of the following attacks, is successful, causes a switch to function like a hub?
answer
MAC flooding
question
Which is a typical goal of MAC spoofing?
answer
Bypassing 802.1x port based security
question
Which protocol should you disable on the user access ports of a switch?
answer
DTP
question
Which of the following switch attacks associates the attacker's MAC address with the IP address of the victim's devices.
answer
ARP spoofing/poisoning
question
You run a small network for your business that has a single router connected to the internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Others hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation.
answer
VLAN
question
Which of the following best describes the concept of virtual LAN?
answer
Devices on the same network logically grouped as if they were on separate networks.
question
A virtual LAN can be created using which of the following?
answer
Switch
question
Which of the following solutions would you implement to eliminate switching loops?
answer
Spanning Tree
question
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
answer
Switch Port
question
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these orts to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
answer
VLANs
question
In which of the following situations would you use port security?
answer
You wanted to restrict the devices that could connect through a switch port.
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. you want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port Authentication
question
You manage a single subnet with thre switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switch loops and ensure there is only a singe active path between any two switches.
answer
Spanning tree
question
You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the Internet. The library computers are in groups of four. Each groups of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so only the library computers are permitted connectivity to the Internet. What can you do?
answer
Configure port security on the switch.
question
You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch. Which of the following should you implement?
answer
802.1x
question
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
answer
Trunk ports
question
Which of the following applications typically use 802.1x authentication?(Select two)
answer
1. controlling access through a wireless access point. 2.controlling access through a switch
question
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented.
answer
VLAN
question
What actions can a typical passive Intrusion Detection System Take when it detects an attacks? (select two)
answer
1. An alert is generated and delivered via e-mail, the console, or SNMP trap. 2. The IDS logs all pertinent data about the intrusion.
question
A honey pot is used for what purpose?
answer
To delay intruders in order to gather auditing data
question
An active IDS system often performs which of the following actions? (Select two)
answer
1. Perform reverse lookups to identify an intruder 2. Update filters to block suspect traffic
question
You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?
answer
Update the signature files
question
What do host based intrusion detection system often rely upon to perform their detection activities?
answer
Host system auditing capabilities
question
You want to create a collection of computers on your network that appear to have valuable data, but are really computers configured with fake data that could entice a potential intruder. Once the intruder connects, you want to be able to observe and gather information about the methods of attack that are being deployed. What should you implement?
answer
Honeynet
question
What security mechanism can be used to detect attacks originating on the internet or from within an internal trusted subnet?
answer
IDS
question
Which of the following activities are considered passive in regards to the functioning of an intrusion detections system?(Choose two)
answer
1. Monitoring the audit trails on a server 2. Listening to network traffic
question
You are concerned about protection your network from network-based attacks from the Internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use?
answer
Anomaly based IDS
question
Which of the following devices is capable of detecting and responding to security threats?
answer
IPS
question
Which IDS method searches for intrusion or attack attempt by recognizing patterns or identities listed in a database?
answer
Signature based
question
Which of the following describes a false positive when using an IPS device?
answer
Legitimate traffic being flagged as malicious
question
What is the most common form of host based IDS that employs signature or pattern matching detection methods?
answer
Anti-virus software
question
You have configured a NIDS to monitor network traffic. Which of the following describes an attack that is NOT detected by the NIDS device?
answer
False Negative
question
IF maintaining confidentiality is of the utmost importance to your organization, what is the best response when an intruder is detected on your network?
answer
Disconnect the intruder
question
Which of the following are characteristics of MLPS?(Select Two)
answer
Adds labels to data units, Supports variable-length data units
question
Which of the following is WAN technology that allows for interoperability of vendor hardware for fiber optic networking?
answer
SONET
question
Which type of network establishes a dedicated connection between two hosts who need to communicate on the network, not allowing any other host to use the medium until the communication is complete?
answer
Circuit-switched
question
Which of the following terms identifies the network of dial-up telephone and the long-distance lines?
answer
PSTN
question
Which of the following are characteristics of ATM?(Select Two)
answer
Uses fixed-length cells of 53-bytes
question
If the SONET (OC-1) base data rate is 51.84 Mbps, how much data can the Optical Carrier level 12 (OC-12) transfer in one second?
answer
622.08 Mb
question
You have a site in your network that is connected to multiple other sites. A single virtual circuit is used to connect to all other sites.
answer
Point-to-multipoint
question
What must install between your network and a T1 line for your network to use the T1 line?
answer
CSU/DSU
question
Which of the following describes the lines used in local loop for dial-up telephone access?
answer
POTS
question
Which type of network divides data to be transmitted into small units and routes these units from the originating system to the destination system, allowing multiple, concurrent communications on the network medium?
answer
Packet-switched
question
What is the speed of an OC-3 connection?
answer
155 mbps
question
Which of the following correctly describes the T1 carrier system?(select two)
answer
A single T1 channel can transfer data at 64 Kbps, T1 lines use pairs of copper wire
question
You are implementing Internet connectivity for a new start-up company. Your client will provide on-line storefronts for retailers. To do this, they have calculated that their Internet connection must provide a data rate of at least 20 - 30 Mbps. Which type of service should you implement?
answer
T3
question
Which of the following technologies uses variable-length packets and adds labels to packets as they enter the WAN cloud, with the labels being used to switch packets and prioritize traffic?
answer
MPLS
question
Which of the following are characteristics of SONET? (Select Two)
answer
Transport protocol used for other traffic types, dual counter-rotating fiber optic rings
question
You have a series of WAN links that connects your site to multiple other sites. Each remote site is connected to your site using a dedicated link What type of connection is being used?
answer
Point-to-point
question
Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?
answer
CSU/DSU
question
You are traveling throughout North America to many metropolitan and rural areas. Which single form of Internet connectivity provides the greatest potential connectivity wherever you travel?
answer
PSTN
question
Which of the following is the most susceptible to interference related to atmospheric conditions?
answer
Satellite
question
Which of the following services are available regardless of whether the telephone company network is available?
answer
Cable modem
question
What is the maximum data rate of an ISDN BRI line?
answer
128 Kbps
question
Which of the following are characteristics of VDSL? (Select Two)
answer
Unequal download and upload speeds, Supports both data and voice at the same time
question
Which of the following is a characteristic of SDSL?
answer
Supports data traffic only (no voice)
question
Which of the following Internet connection technologies requires that the location be within a limited distance of the telephone company central office?
answer
DSL
question
Which two of the following describe the channels and the data transfer rates used for ISDN BRI(Select Two)
answer
One D channel operating at 16 Kbps, Two B channels operating at 64 Kbps each
question
To access the Internet through the PSTN, what kind of connectivity device must you use?
answer
Modem
question
Which of the following Internet services provides equal upload and download bandwidth?
answer
SDSL
question
Which WAN connection types use digital communications over POTS?(Select two)
answer
ISDN, DSL
question
A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the Internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?
answer
Satellite
question
Which three of the following are characteristics of ISDN?
answer
It provides enough bandwidth to transmit data at much higher speeds than standard modems and analog lines, It is a dial-up service that uses existing copper wires for the local loop, It lets you transmit voice, video, and data over the same lines.
question
You want to set up a service to allow multiple users to dial into the office server from modems on their home computers. What service should you implement?
answer
RAS
question
Which of the following is a platform independent authentication system that maintains a database of user accounts and passwords that centralizes the maintenance of those accounts?
answer
RADIUS
question
Which of the following protocols of services is commonly used on cable Internet connections for user authentication?
answer
PPPoE
question
You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files on that server that you need. You want the connection to be as secure as possible. Which type of connection will you need?
answer
Remote access
question
Which of the following are characteristics TACACS+?(Chose Two)
answer
Uses TCP, Allows for a possible of three different servers, one each for authentication, authorization, and accounting
question
You have decided to implement a remote access solution that uses multiple remote access servers. You want to implement RADIUS to centralize remote access authentication and authorization.
answer
Configure the remote access servers as RADIUS servers.
question
Which of the following are methods for providing centralized authentication, authorization, and accounting for remote access? (Select two)
answer
TACACS+, RADIUS
question
You have just signed up for Internet access using a local provider that gives you a fiber optic line into your house. From there, Ethernet and wireless connections are used to create a small network within your home. Which of the following protocols would be used to provide authentication, authorization, and accounting for the Internet connection?
answer
PPPoE
question
Which of the following are differences between RADIUS and TACACS+?
answer
RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.
question
You are configuring your computer to dial up to the Internet. What protocol should you use?
answer
PPP
question
Users on your network report that they have received an email stating that the company has just launched a new website for employees, and to access the Web site they need to go there and enter their user name and password information. No one in your company has sent this email. What type of attack is this?
answer
Phishing
question
Which of the following statements about the use of anti-virus software is correct?
answer
Anti-virus software should be configured to download updated virus definition files as soon as they become available.
question
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
answer
Denial of Service
question
A Smurf attack requires all but which of the following elements to be implemented?
answer
Padded cell
question
Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day you find that an employee has connected a wireless access point to the network office. What type of security risk is this?
answer
Rouge access point
question
Which of the following describes a man-in-the -middle?
answer
A false server intercepts communications from a client by impersonating the intended server.
question
What is the primary countermeasure to social engineering?
answer
Awareness
question
Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
answer
Denial of Service attack
question
Which of the following is a form of denial of service attack that uses spoofed ICMP PACKETS TO FLOOD A VICTIM WITH ECHO REQUESTs USING A BOUNCE/AMPLIFICATION network?
answer
Smurf
question
What is the main difference between a worm and a virus?
answer
A worm can replicate itself and does not need a host for distribution.
question
How can an organization help prevent social engineering attacks?(Select Two)
answer
Educate employees on the risks and countermeasures, Publish and enforce clearly written security policies.
question
Capturing packets as they travel from one host to another with the with the intent of altering the contents of the packets is a form of which security concern?
answer
Man-in-the-middle attack
question
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it found?
answer
Virus
question
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted. You discover that user download a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation doe not occur. What should you do?
answer
Install a network virus detection software solution.
question
Which of the following measures are you most likely to implement in order to protect against a worm or a Trojan horse?
answer
Anti-virus software
question
Which of the following is the best countermeasure against man-in-the-middle attacks?
answer
IPSec
question
Which of the following is NOT a primary characteristic of a worm?
answer
It infects the MBR of a hard drive
question
Which of the following are examples of social engineering? (Select Two)
answer
Dumpster diving, Shoulder surfing
question
Which of the following are characteristics of a circuit-level gateway? (Select Two)
answer
Filters based on sessions, Stateful
question
How does a proxy server differ from a packet filtering firewall?
answer
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
question
Which port number is used by SNMP?
answer
161
question
You are the administrator for a secure network that uses firewall filtering. Several network users have requested to access Internet Usenet groups but are unable. What needs to be done to allow users to access the newsgroups?
answer
Open port 119 to allow NNTP service.
question
You administer a Web server on your network. The computer has multiple IP addresses. They are 192.168.23.8 to 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: IP address: 192.168.23.8, HTTP Port: 1030, SSL Port: 443. Users complain that they can't connect to the web site when they type www.westsim.com. What is the most likely source of the problem?
answer
The HTTP port should be changed to 80.
question
Which of the following functions are performed by proxies? (select two)
answer
Cache web pages, Block employees from accessing certain websites.
question
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company president to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?
answer
Install a proxy server.
question
Which protocol and port number is used by BOOTP/DHCP?
answer
UDP 67
question
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
answer
ACL
question
Using the Netstat command you notice that a remote system has made a connection to your Windows server 2003 system using TCP/IP port 21. Which of the following actions is the remote system most likely to be performing ?
answer
Downloading a file
question
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
answer
Circuit-level
question
Haley configures a Web site using Windows 2000 default values. What are the HTTP port and SSL port settings?
answer
80 for HTTP; 443 for SSL
question
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following TCP/IP ports should you open on the firewall? (Select Two)
answer
25, 110
question
Which of the following are characteristics of a packet filtering firewall? (Select Two)
answer
Filters IP address and port, Stateless
question
You manage a small network at work. Users use workstations connected to your network. No portable computers are allowed. As part of your security plan, you would like to implement scanning of emails for all users. You want to scan the emails and prevent any emails with malicious attachments from being received by users. Your solution should minimize administration, allowing you to centrally manage the scan settings. Which solution should you use?
answer
Network based firewall
question
You have a company network that is connected to the internet. You want all users to have internet access, but need to protect your private network and users. You also need to make private network and users. You also need to make a Web server publicly available to Internet users. Which solution should use?
answer
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ
question
Which protocol and port number is used by TFTP?
answer
UDP 69
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a web server and an email server that you want to make available to Internet users. You want to create a DMZ for these servers. Which type of device should you use to create the DMZ?
answer
Network based firewall
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
answer
Host based firewall
question
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets.
answer
IP address
question
IPsec is implemented through two separate protocols. What are these protocols called? (Select Two)
answer
AH, ESP
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network.
question
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save files on the server, and print files to a printer connected to a computer at home. Which protocol should you use?
answer
RDP
question
You have a group of salesman who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network.
answer
PPTP
question
You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations including airports, hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
answer
SSL
question
Which of following network layer protocols provides authentication and encryption services for IP based network traffic?
answer
IPSec
question
Which of the following protocols can your portable computer use to connect to your company's network via a tunnel through the Internet? (Select two)
answer
L2TP
question
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?
answer
Trunking
question
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to the switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
answer
VLANs
question
When configuring VLANs on a switch, what is used to identify VLANs on a switch, what is used to identify VLAN membership of a device?
answer
Switch port
question
Which of the following do switches and wireless access points use to control access through the device?
answer
MAC filtering
question
Which of the following best describes the concept of a virtual LAN?
answer
Devices on the same network logically grouped as if they were grouped on separate networks.
question
Which switch features are typically used with VoIP? (Select Two)
answer
PoE, VLAN
question
Which of the following connectivity hardware is used to create a LAN?
answer
Switch
question
You manage a private network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1, and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?
answer
Trunking
question
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
answer
Trunk ports
question
Which type of devices is required to implement port authentication through the switch?
answer
RADIUS server
question
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?
answer
VLAN
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug in their computers to the free network jacks and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication
question
You manage a network with two switches. The switches are connected together through their Gigabit uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in the VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?
answer
Routing
question
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
answer
VLAN
question
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
answer
Ticket
question
Which of the following are used when implementing Kerberos for authentication and authorization? (Select Two)
answer
Time server, Ticket granting
question
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
answer
EAP
question
You want to increase the security of your network by allowing only authenticated users to be able to access network devices through a switch? Which one of the following should you implement?
answer
802.1x
question
Which of the following applications typically use 802.1x authentication? (Select Two)
answer
Controlling access through a switch, Controlling access though a wireless access point
question
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smart card system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?
answer
EAP
question
Which of the following authentication protocols uses a three-way handshake to authenticate users to the network? (Choose two)
answer
CHAP, MS-CHAP
question
Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?
answer
Mutual authentication
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following authentication methods uses tickets to provide single sign on?
answer
Kerberos
question
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
answer
Obtain a certificate from public PKI
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH
question
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
answer
Implement version 3 SNMP
question
Which of the following protocols are often added to other protocols to provide secure transmission of data? (Select two)
answer
SSL, TLS
question
Which protocol does HTTPS use to offer greater security in Web transactions?
answer
SSL
question
which protocol is used for securely browsing a Web site?
answer
HTTPS
question
Which of the following are improvements to SNMP that are included within SNMP version 3? (Select two)
answer
Authentication for agents and managers, Encryption of SNMP messages
question
Telenet is inherently insecure because its a communication is in plain text and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
answer
SSH
question
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
answer
Host based IDS
question
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? (Select two)
answer
The IDS logs all pertinent data about the intrusion, An alert is generated and delivered via Email, the console, or an SNMP trap.
question
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
answer
IDS
question
You are concerned about protecting your network from network based attacks from the Internet. Specifically, you are concerned about "zero day" attacks (attacks that have not yet been identified or that do not have prescribed protections).
answer
Anomaly based IDS
question
You want to make sure that a set of servers will only accept traffic for specific network services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?
answer
Port scanner
question
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
answer
IDS
question
Which of the following functions can a port scanner provide?
answer
Discover unadvertised servers, Determining which ports are open on a firewall
question
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack. Which tool should you use?
answer
IPS
question
Which of the following devices can monitor a network and detect potential security attacks?
answer
IDS
question
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities list in a database?
answer
Signature based
question
What is the most common form of host based IDS that employs signature or pattern matching detection methods?
answer
Anti-virus software
question
Which of the following devices is capable of detecting and responding to security threats?
answer
IPS
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New