Term
Actively monitoring data streams in search of malicious code or behavior is an example of:
A. load balancing
B. an Internet proxy
C. URL filtering
D. content inspection |
|
Definition
|
|
Term
Which of the following network devices would MOST likely be used to detect but not react to suspicious behavior on the network?
A. Firewall
B. NIDS
C. NIPS
D. HIDS |
|
Definition
|
|
Term
The security adminsitrator is getting reports from users that they are accessing certain websites and are unable to download anything off of those sites. The security administrator is also receiving several alarms from the IDS about suspious traffic on the network. Which of the following is the MOST likely cause?
A. NIPS is blocking activities from those specific websites
B. NIDS is blocking activities from those specific websites
C. The firewall is blocking web activitiy
D. The router is denying all traffic from those sites |
|
Definition
A. NIPS is blocking activities from those specific websites |
|
|
Term
Which of the following tools provides the ability to determine if an application is transmitting a password in clear-text?
A. Protocol analyzer
B. Port scanner
C. Vulnerability scanner
D. Honeypot |
|
Definition
|
|
Term
Which of the following can a security adminsitrator implement to help identify smurf attacks?
A. Load Balancer
B. Spam filters
C. NIDS
D. Firewall |
|
Definition
|
|
Term
Which of the following wireless security controls can be easily and quickly circumvented using only a network sniffer? (Choose TWO)
A. MAC filtering B. Disabled SSID broadcast C. WPA2-Enterprise D. EAP-TLS E. WEP with 802.1x |
|
Definition
A. MAC filtering B. Disabled SSID broadcast |
|
|
Term
Which of the following functions is MOST likely performed by a web security gateway?
A. Protocol analyzer B. Content filtering C. Spam filter D. Flood guard |
|
Definition
|
|
Term
Which of the following devices is often used to cache and filter content?
A. Proxies B. Firewall C. VPN D. Load balancer |
|
Definition
|
|
Term
In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO) A. Subnetting B. NAT C. Firewall D. NAC E. VPN |
|
Definition
|
|
Term
Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
A. Load balancer B. URL filer C. VPN concentrator D. Protocol Analyzer |
|
Definition
|
|
Term
An IT administrator wants to provide 250 staff with secure remote access to the corporate network. Which of the following BEST achieves this requirement?
A. Software based firewall B. Mandatory Access Control (MAC) C. VPN Concentrator D. Web security gateway |
|
Definition
|
|
Term
Which of the following should be installed to prevent employees from receiving unsolicited emails?
A. Pop-up blockers B. Virus definitions C. Spyware definitions D. Spam filters |
|
Definition
|
|
Term
Which of the following should a security adminsitrator implement to prevent users from disrupting network connectivity, if a user connects both ends of a network cable to different switch ports?
A. VLAN seperation B. Access Control C. Loop protection D. DMZ |
|
Definition
|
|
Term
A user is no longer able to transfer files to the FTP server. The security adminstrator has verified the ports are open on the network firewall. Which of the following should the security adminsitrator check?
A. Anti-virus software B. ACLs C. Anti-spam software D. NIDS |
|
Definition
|
|
Term
Which of the following BEST describes the proper method and reason to implement port security?
A. Apply security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network B. Apply a security control which ties specific networks to end-device IP addresses and prevents new devices from being connected to the network C. Apply a security control which ties specific ports to end-device MAC addresses and prevents all devices from being connected to the network D. Apply a security control which ties specific ports to end-device IP addresses and prevents mobile devices from being connected to the network |
|
Definition
A. Apply security control which ties specific ports to end-device MAC addresses and prevents additional devices from being connected to the network |
|
|
Term
Which of the following would need to be configured correctly to allow remote access to the network?
A. ACLs B. Kerberos C. Tokens D. Biometrics |
|
Definition
|
|
Term
By default, which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
A. Access Control Lists B. Explicit Allow C. Explicity Deny D. Implicit Deny |
|
Definition
|
|
Term
Based on logs from file servers, remote access systems, and IDS, a malicous insider was stealing data using a personal laptop while connected by VPN. The affected company wants access to the laptop to determine loss, but the insider's lawyer insists the laptop cannot be identified. Which of the following would BEST be used to identify the specific computer used by the insider?
A. IP address B. User profiles C. MAC address D. Computer name |
|
Definition
|
|
Term
Applying detailed instructions to manage the flow of network traffic at the edge of the network, including allowing or denying traffic based on port, protocol, address, or direction is an implentation of which of the following?
A. Virtualization B. Port security C. IPSec D. Firewall rules |
|
Definition
|
|
Term
Which of the following is the default rule found in a corporate firewall's access control list?
A. Anti-spoofing B. Permit all C. Multicast list D. Deny all |
|
Definition
|
|
Term
Which of the following is BEST used to prevent ARP poisoning attacks across a network?
A. VLAN segregation B. IPSec C. IP filters D. Log analysis |
|
Definition
|
|
Term
A small company needs to invest in a new expensive database. The company's budget does not include the purchase of additional servers or personnel. Which of the following solutions would allow the small company to save money on hiring additional personel and minimize the footprint in their current datacenter?
A. Allow users to telecommute B. Setup a load balancer C. Infrastructure as a Service D. Software as a Service |
|
Definition
|
|
Term
Which of the following is MOST likely to be the last rule contained on any firewall?
A. IP allow any any B. Implicit Deny C. Seperation of duties D. Time of day restricitions |
|
Definition
|
|
Term
Which of the following cloud computing concepts is the BEST described as providing an easy-to-configure OS and on-deman computing for customers?
A. Platform as a Service B. Software as a Service C. Inrastructure as a Service D. Trusted OS as a Service |
|
Definition
|
|
Term
MAC filtering is a form of which of the following?
A. Virtualization B. Network Access Control C. Virtual Private Networking D. Network Address Translation |
|
Definition
B. Network Access Control |
|
|