ads

2 Januari 2024

Network Security and Emerging Technologies

 

Question:

When an organization uses two firewalls to protect their network, the space between the firewalls is known as what?

  • DMZ

Question
:

Which of the following are authentication factors? (Select all correct answers.)

  • Password
  • Token generator
  • Fingerprint

Question
:

Which type of attack uses common TCP/IP protocols and software to target a network and learn information?

  • Scanning attacks

Question
:

Which of the following statements regarding encryption are true? (Select all correct answers.)

  • Asymmetric encryption algorithms use a public key for encryption and a private key for decryption.
  • VPNs are a common use of encrypting data in transit.

Question
:

Why is security training and education so important?

  • Attackers are always coming up with new variations of exploits
  • It's one of the best tools for improving information security

Question
:

What type of VPN is being used in the following scenarios?

  • Site-to-site VPN - Users in your network can securely and directly connect to headquarters using the internet to utilize applications.
  • Remote Access VPN - Traveling sales reps need to have secure communications with headquarters but often have to use unsecure local wireless connections

Question
:

For each of the following scenarios, identify the name of the specific threat being described (spyware, shoulder surfing, eavesdropping, etc.).

  • Dumpster diving - An attacker sifts through your trash to discover account information.
  • Keystroke logger - An attacker installs software to record everything you type in an effort to steal your passwords.
  • RAT - You download and install a game. Hidden in the game is software that gives an attacker remote access to your computer.
  • Eavesdropping - An attacker uses a protocol analyzer to intercept and read network traffic.
  • DDoS - An attacker overwhelms your web server with repeated requests from multiple compromised computers.
  • Phishing - A phony e-mail from your bank alerts you that your account has been compromised and gives you a link to visit to verify your credentials.

Question
:

Match the wireless technology to the statement that describes it.


  • 802.11ah HaLow - Up to 18 Mbps at 100 meters or more. Intended for smart home applications.
  • 5G - 1 to 10 Gbps with low latency. Intended for high-speed access by smartphones and mobile computing devices.
  • 802.11ad WiGig - 7 Gbps at 10 meters. Intended for cable replacement.
  • BLE - 1.5 Mbps up to 100 meters. Intended for small devices running on coin cell batteries.

Question
:

The goal of threat mitigation is to:

  • Reduce risk

Question
:

The IDS determines an attack has occurred at your organization. Security is notified right away. After assessing the situation, management would like to implement a solution that can stop the attack once it is detected. What type of solution should you suggest?

  • IPS


Question
:

What is the goal of SDN?

  • Allow network engineers to respond quickly to changing network conditions


Question
:

What is the goal of the Internet of Things?

  • Make everything smart so that objects can connect to the Internet to report data, be monitored, or be remotely controlled

Question
:

Which of the following are NOT true of hackers?

  • Hackers are always an expert in their field

Question
:

Determine the best authentication solution for the following scenarios.

  • Kerberos - An organization running Windows Server needs a highly compatible authentication system.
  • TACACS - An organization using Cisco network devices needs to authenticate remote and wireless workers.
  • RADIUS - Remote users need to access the network via VPN. There are also wireless users that need to be authenticated.
  • CHAP - Users need an encrypted login over a dial-up connection.


Question
:

Malware is software that infects a user's computer system without that user's permission. What types of malware are being described below?

  • Spyware  - Keeps track of a user's behaviors such as browser activity and download history.
  • Trojan Horse - Appears credible but can install other forms of malware.
  • RAT (Remote Access Trojan) - Allows attackers to manipulate and control a computer, often to attack networks.
  • Keylogger - Every keystroke a user makes is recorded and transmitted to an attacker.

Question
:

Match the common security threat with its description.

  • A technological or human flaw - Weaknesses
  • A weakness exploited by an attacker - Vulnerabilities
  • An actor who exploits a vulnerability - Threat actor
  • An unsecured network - Threat

Question
:

Match the type of firewall to the statement that best describes it.

  • Stateful inspection - Only passes traffic that fits the context of a session
  • UTM - Combines packet and content filtering with anti-virus and anti-spam
  • Packet filter - Filters traffic based on header information, such as MAC address, IP address, and port number
  • Personal firewall - Inspects traffic entering and leaving a device that is connected to the network
  • Proxy server - 

Question
:

Unsecured networks can subject a user to many types of attacks, from eavesdropping on transmitted data to stealing information. What is the best way to mitigate these attacks?

  • Use VPN connections and encrypted websites

Question
:

You receive an email asking for donations to help rescue efforts following a recent earthquake. The email provides a link to where you can donate money. This may be what type of social engineering attack?

  • Phishing attack

Question
:

Which of the following components should be part of your security plan? (Select all correct answers.)

  • Mitigations to be performed at network access points
  • Plan for reacting to security events
  • Access levels for resources and job positions
  • Physical security controls

Question
:

Why is it a good idea to have employees bring their own laptops or tablets? Choose all that apply.

  • They are familiar with them and therefore more productive.
  • It saves the company money from not having to purchase new machines.


Question

:

Your organization starts receiving massive amounts of SPAM through its email server. What type of solution should you consider implementing?

  • Blacklist