Network Security Fundamentals Flashcards

(24 cards)

1
Q

Which two numbers could you use in the numbered configuration method, or a number as a name in the named configuration method, to configure standard IPv4 access lists? (Choose two.)

150

100

305

2000

2300

75

1305

A

75 and 1305

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ACL statement has the matching criteria specified as 192.168.122.128 0.0.0.63. Which two IPv4 addresses would match the criteria? (Choose two.)

192.168.0.195

192.168.122.195

192.68.120.190

192.168.122.140

192.168.122.63

192.168.122.191

A

192.168.122.140 and 192.168.122.191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which application of an ACL is indicated by the statement “ACLs can permit or deny user access to FTP or HTTP servers”?

selection of traffic for prioritization

selection of traffic for analyzing

filtering of traffic to control access to network services

restricting the delivery of routing updates

A

filtering of traffic to control access to network services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which range of addresses is included in the matching criteria 10.220.56.0 0.0.7.255?

10.220.56.0 to 10.255.255.255

10.220.56.0 to 10.220.67.255

10.220.56.0 to 10.220.56.255

10.220.56.0 to 10.220.63.255

A

10.220.56.0 to 10.220.63.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which three commands would enable you to enter extended ACL statements on a router? (Choose three.)

Router(config)# access-list 101

Router(config)# access-list 1300

Router(config)# ip access-list extended 1300

Router(config)# ip access-list extended 101

Router(config)# ip access-list extended EXT_ACL

A

Router(config)# access-list 101
Router(config)# ip access-list extended 101
Router(config)# ip access-list extended EXT_ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

any circumstance or event with the potential to cause harm to an asset

weakness that compromises either the security or the functionality of a system

mechanism that is used to leverage a vulnerability to compromise the security or functionality of a system

likelihood that a particular threat using a specific attack will exploit particular vulnerability

methods and corrective actions that you can take to protect against threats, specific exploits, and so on

Options: risk, exploit, threat, vulnerability, and mitigation techniques

A

Any circumstance or event with the potential to cause harm to an asset → Threat

Weakness that compromises either the security or the functionality of a system → Vulnerability

Mechanism that is used to leverage a vulnerability to compromise the security or functionality of a system → Exploit

Likelihood that a particular threat using a specific attack will exploit a particular vulnerability → Risk

Methods and corrective actions that you can take to protect against threats, specific exploits, and so on → Mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are working as IT security engineer and you are browsing through the sectools.org website to see the top network security tools, as well as find more details on each particular tool and read reviews for it. What is the initiative that runs this website?

IEEE

ITU-T

Nmap Project

Metasploit

A

Nmap Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attackers create false identities on social networks, building and exploiting friend relationships with others on the social network.

Attackers target operating systems on consumer devices, such as smartphones, tablets, and so on.

Attackers targeting virtual servers, virtual switches, and trust relationships at the hypervisor level.

Attackers try to exploit operating systems and applications that leave traces of data in memory, to fetch information directly from the volatile memory.

Attackers perform bus sniffing, altering firmware, memory dumping to find crypto keys, utilize hardware-based keyloggers, etc. hardware hacking, memory scraping, virtualization exploits, consumer electronics exploit and cognitive threats via social networkss

Options: cognitive threats via social networks, memory scraping, hardware hacking, virtualization exploits and consumer electronics exploits

A

Attackers create false identities on social networks, building and exploiting friend relationships with others on the social network.

cognitive threats via social networks

Attackers target operating systems on consumer devices, such as smartphones, tablets, and so on.

consumer electronics exploits

Attackers targeting virtual servers, virtual switches, and trust relationships at the hypervisor level.

virtualization exploits

Attackers try to exploit operating systems and applications that leave traces of data in memory, to fetch information directly from the volatile memory.

memory scraping

Attackers perform bus sniffing, altering firmware, memory dumping to find crypto keys, utilize hardware-based keyloggers, etc.
hardware hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are asked to conduct a training session in your company to educate employees about social engineering attacks. What is a common social engineering technique?

phishing

password cracking

MAC address spoofing

UDP flood

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ou want to display public information regarding your company’s domain from the public DNS registries so you can see what information can be gathered by a reconnaissance attack on the DNS. Which command-line tool can you use on a Microsoft Windows computer?

dig

nslookup

ns-lookup

whois

grep

A

whois

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which three options are important services that network security aims to provide to manage risk? (Choose three.)

confidentiality

availability

defense in depth

accounting

integrity

A

confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two options are examples of a DDoS attack? (Choose two.)

email trying to entice users to access multiple malicious websites

attempts to crack username and password from different hosts

large amounts of traffic sent to a website from different hosts

large number of emails sent to an email service from a single host

large number of TCP connections to an email service from different hosts

A

large amounts of traffic sent to a website from different hosts and large number of TCP connections to an email service from different hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Match the IPsec component with its category.

confidentiality

authentication

key management

data integrity

Options: IKE, ECDSA, AES and SHA-2

A

Confidentiality → AES (used to encrypt data)

Authentication → ECDSA (used for verifying identity)

Key management → IKE (Internet Key Exchange, manages keys)

Data integrity → SHA-2 (hashing algorithm to ensure data hasn’t been altered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Assume that you are traveling and are connected to a public wireless network. Your company uses multiple tunneling policies for a VPN session. To ensure that your internet traffic and traffic when accessing internal resources remains confidential, which policy must you use?

SSL-tunneling

split-tunneling

TLS-tunneling

full-tunneling

A

full-tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In a WLAN, a common key can be used for which three things? (Choose three.)

authentication only

authorization only

accounting only

authentication and encryption

encryption only

A

authentication and encryption and encryption only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement is correct regarding how ESP modes protect an IP packet?

In the transport mode, security is provided only for the transport layer and below.

In the tunnel mode, security is provided for the complete original IP packet.

In the tunnel mode, security is provided only for the transport layer and above.

In the transport mode, security is provided for the entire IP packet.

A

In the tunnel mode, security is provided for the complete original IP packet.

17
Q

Which WPA3 feature uses 802.1X for authentication?

Open Networks

WPA3-Enterprise

IoT secure onboarding (DPP)

WPA3-Personal

A

WPA3-Enterprise

18
Q

A network administrator is writing a standard IPv4 ACL that will deny traffic from the 172.16.0.0/16 network and permit all other traffic. Which two commands should be used? (Choose two.)

Router(config)# access-list 95 deny any

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255

Router(config)# access-list 95 deny 172.16.0.0 255.255.0.0

Router(config)# access-list 95 permit any

Router(config)# access-list 95 deny host 172.16.0.0

Router(config)# access-list 95 deny 172.16.0.0 255.255.255.255

A

Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255 and Router(config)# access-list 95 permit any

19
Q

Which three ACL statements are written correctly? (Choose three.)

Router(config-ext-nacl)#10 permit tcp host 192.168.1.1 host 209.165.201.1 eq 22

Router(config-ext-nacl)# deny ip any any host 209.165.201.0 eq 10

Router(config-ext-nacl)# permit icmp any host 200.165.201.1

Router(config-ext-nacl)# deny tcp host 209.165.201.0 host 192.168.1.1 eq 22

Router(config-ext-nacl)# deny tcp any host 201.165.201.0 0.0.0.31 host 192.168.1.1 eq 22

Router(config-ext-nacl)# permit udp host any eq dns

A

Router(config-ext-nacl)# 10 permit tcp host 192.168.1.1 host 209.165.201.1 eq 22, Router(config-ext-nacl)# permit icmp any host 200.165.201.1 and Router(config-ext-nacl)# deny tcp any host 201.165.201.0 0.0.0.31 host 192.168.1.1 eq 22

20
Q

Which two options represent man-in-the-middle attacks? (Choose two.)

DDoS

phishing

DHCP spoofing

brute force password attack

impersonating public Wi-Fi network, while redirecting connected users to internet

A

DHCP spoofing and impersonating public Wi-Fi network, while redirecting connected users to internet

21
Q

You have detected that there is a rogue DHCP server in the local area network that replies to client DHCP requests before they reach the authentic DHCP server in the company. Which two options describe this type of attack? (Choose two.)

DHCP DoS attack

DHCP spoofing attack

DHCP authentication attack

IP address spoofing

application/service spoofing

A

DHCP spoofing attack and DHCP DoS attack

22
Q

The anti-malware software in your company has discovered malicious software that replicated itself on several computers with functional copies that can cause the same type of damage. Which two malware types can compromise other systems? (Choose two.)

worm

virus

trojan horse

APT

ARP

A

Worm and viruss

23
Q

Which two security measures can help block password brute force attacks? (Choose two.)

Use multiple authentication servers.

Implement account lockout after a number of bad guesses.

Specify a minimum length of a password, such as 8 to 12 characters.

Specify a maximum length of a password, such as 8 to 12 characters.

Implement password complexity, such as all upper case characters in the password.

A

Implement account lockout after a number of bad guesses and Specify a minimum length of a password, such as 8 to 12 characters

24
Q

How does Unicast Reverse Path Forwarding help with DoS and DDoS attacks mitigation?

by distributing the footprint of DDoS attacks

by verifying the “reachability” of the source address in packets being forwarded

by monitoring connection states and maintaining a state table

by monitoring interface packet counters

A

by verifying the “reachability” of the source address in packets being forwarded