• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back

Which statement(s) about port security is correct?
1) Attackers can simply plug into a network connection and gain access if ports aren't secured
2) Port Authentication involves using IEEE 802.x protocols to secure logical ports
3) Mobile devices don't represent a security threat because they don't have access to network ports
4) One method of increasing port security is to disable unused, open ports


5) Certain network switches can detect duplicate MAC addresses

* Attackers can simply plug into a network connection and gain access if ports aren't secured


* One method of increasing port security is to disable unused, open ports


* Certain network switches can detect duplicate MAC addresses

Which descriptions of security and assessment tools are correct?


1) OVAL is an open, interoperable language which can be used to detect network vulnerabilities, work with different applications, and share results with others
2) To protect network integrity and safety, vulnerability scanners are designed so they do not exploit network resources
3) Port scanners detect running services on open ports
4) Sniffing is not a legitimate process and should never be employed by administrators

* OVAL is an open, interoperable language which can be used to detect network vulnerabilities, work with different applications, and share results with others


* Port scanners detect running services on open ports

Watering hole attack

A hacker infects a web site that an organization knows and trusts with malware

Typo squatting

A hacker tricks a user into navigating to a web site that has a similar name to a legitimate site

How are assessment tools used to secure a network?

* Vulnerability scanners are used to map network devices
* Port scanners are used to pin all active servers on a network
* Protocol analyzers are used to analyze data packet destination and flags

You're a network administrator.
Which actions should you take to secure your network?
1) Implement DMZ outside the network firewall
2) Connect a device that uses EAP requests to a network switch
3) Use a system to check the status of all computers in a network and log the findings
4) Maintain unused employee accounts on a separate server
5) Implement a policy for regular software updates and patches

* Connect a device that uses EAP requests to a network switch
* Use a system to check the status of all computers in a network and log the findings
* Implement a policy for regular software updates and patches

What are guidelines for securing a switch?
1) Regularly install firmware updates on switches
2) Increase the number of MAC addresses that can be associated with a specific port
3) Enable HTTP for switch management
4) Protect against loops using spanning tree protocols
5) Select a single secure communications method such as Secure Shell, or SSH
6) Logically separate networks using VLANS

* Regularly install firmware updates on switches


* Protect against loops using spanning tree protocols


* Select a single secure communications method such as Secure Shell, or SSH


* Logically separate networks using VLANS

What are characteristics of host-based firewalls?
1)They're capable of performing basic packet filtering
2)They can be used on workstations in an enterprise network
3)They provide protection for hosts only
4)They support only workstations in an enterprise network
5)They're hardware-based devices

* They're capable of performing basic packet filtering


* They can be used on workstations in an enterprise network


* They provide protection for hosts only

What are the advantages of subnetting?
1) It provides a further level of access control
2) It increases network performance
3) It improves ease of management
4) It encrypts data in transit
5) It prevents direct access between the internet and private networks
6) It limits packet capture
7) It reduces the potential impact of malware

* It provides a further level of access control


* It increases network performance


* It improves ease of management


* It limits packet capture


* It reduces the potential impact of malware

What are the functions of an IPS?
1) An IPS passively notifies personnel when malicious traffic is encountered
2) An IPS reacts actively to threats against the network
3) An IPS is placed deep inside of the network to prevent attacks from external sources
4) An IPS monitors network and system activities for threats

* An IPS reacts actively to threats against the network


* An IPS monitors network and system activities for threats

Add something

Add something