______ a section of a network that is isolated from the rest of the netwrok with firewalls.
DMZ (De-Militartized Zone)
Kerberos, SESAME & Active Directory are ______ _______ _______.
three technologies that provide single sign-on authentication.
SESAME (Secure European for Application in a Multi-vendor Environment) is a _____ - ____ _____ ______.
single sign-on technology addressed to issues in Kerberos and is based on public key cryptography.
RSA is an example of ?
Asymmetric cryptography with “authentication”
What decrypts incoming traffic, examines that traffic and re-encrypts it before it goes back out on the network?
SSL decryptors
What alleviates the load on the processor during encryption, it also transfers the encryption process to a separate device, typically a PCI card for encryption?
SSL/TLS accelerators
IMAP (Internet Message Access protocol) port?
Port 143
Your company has recently purchased several computers that have TPM hardware. Which technology works with this hardware?
IPSEC
Management has decided to purchase a new appliance firewall that will be installed between the public and private networks owned by your company. Which type of firewall is also referred to as an appliance firewall?
Hardware
You need to implement an authentication system that verifies the identity of the users through their eyes? Which type of authentication should you implement?
A retinal scan
A load balancer is a device that distributes network or application traffic across a cluster of servers. Which load balancer scheduling algorithm is used to keep a host connected with the same resource throughout an entire session?
Affinity-based scheduling ensures that all requests from the user during the session are sent to the same instance.
A WAP (Wireless Access Point) is a point of entry/exit for radio-based signals to a network. Which component is used to identify WAPs on a network and is not effective network security when turned off?
SSID is used to identify a WAP on a network. Turning off a Service Set Identifier (SSID) doesn’t effectively protect a network from attack because the SSID is still sent in plaintext, allowing anyone to sniff it.
Which GPS technology creates a virtual fence around a location and detects mobile devices from entering into that fence?
Geofencing uses a virtual fence around a location and detects mobile devices when entering that fence.
A vulnerability scanner is a program designed to probe a system for misconfiguration, old software versions, and other weaknesses. Which type of vulnerability scanner is used to perform a broad sweep for vulnerabilities on more than one host across the network?
A network vulnerability scanner performs a broad sweep for vulnerabilities on more than one host across the network.
Which command provides a list of hops that traffic transverses as it is routed to the remote target?
The traceroute command lists hops and uses ICMP to build a trace of the packet in route, so if ICMP is blocked on any device, traceroute will be unable to provide information for that device..
Which term is used when a malicious or suspicious event does not trigger a rule on the IDS/IPS?
A false negative should be reported as they do not trigger a rule, but it should because it has captured a malicious event.
Which protocol is used to securely transfer files between a client and a server over port 22?
Secure File Transfer Protocol (SFTP) runs over port 22 and is used to securely transfer files from a client to a server.
Credentials should be protected at the level in which they’re accessed. Which protocols are a major security concern because they send credentials in plaintext?
SMTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Telnet sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
FTP sends credentials in plaintext. This poses a security threat as anyone could sniff and use this data to authenticate against a system.
Which is a security extension for voice and video communications that uses encryption, message authentication, integrity checks, and protection replay?
SRTP (Secure Real-Time Transport Protocol or Secure RTP) is an extension to RTP (Real-Time Transport Protocol) that incorporates enhanced security features such as encryption, message authentication, integrity checks, and protection replay.
What is a baselining?
An organization’s baseline starts from a secure posture after fixing any security issues.
Data exfiltration refers to an attacker who is is attempting to export data from a system. How can an admin protect against data exfiltration?
Devices should be periodically checked for weak or misconfigured settings because most security controls rely on good configurations to perform properly.
Having up-to-date configurations decreases the chance of data exfiltration.
Which deployment model allows a device to be used only for business and is paid for by the organization?
Corporate-Owned Business Only (COBO) deployment allows a device to be used solely for business and is paid for by the organization.
Port security uses MAC addresses to control access to ports on a switch. Which variant of port security allows specific MAC addresses to an assigned port?
Static learning controls access to ports by using specific MAC addresses. This method is helpful when using fixed and dedicated hardware.
Which of the following information does a context-aware authentication mechanism use?
Context-aware authentication mechanisms use the CONNECTION METHOD of the device to allow or block access.
Context-aware authentication mechanisms use the LOCATION OF THE DEVICE to allow or block access.
Context-aware authentication mechanisms use the REQUESTED RESOURCE to allow or block access.
Context-aware authentication mechanisms use a SPECIFIC USER of the device to allow or block access.
Context-aware authentication mechanisms checks the DEVICE IN USE to allow or block access.