General Knowledge

198 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
QUESTION 1Sara, the security administrator, must configure the corporate firewall to allow all public IP addresses on the internal interface of the firewall to be translated to onepublic IP address on the external interface of the same firewall. Which of the following should Sara configure?
  • A. PAT
  • B. NAP
  • C. DNAT
  • D. NAC
Correct Answer: A
QUESTION 2Which of the following devices is MOST likely being used when processing the following?1 PERMIT IP ANY ANY EQ 802 DENY IP ANY ANY
  • A. Firewall
  • B. NIPS
  • C. Load balancer
  • D. URL filter
Correct Answer: A
QUESTION 3The security administrator at ABC company received the following log information from an external party:10:45:01 EST, SRC 10.4.3.7:3056, DST 8.4.2.1:80, ALERT, Directory traversal10:45:02 EST, SRC 10.4.3.7:3057, DST 8.4.2.1:80, ALERT, Account brute force10:45:03 EST, SRC 10.4.3.7:3058, DST 8.4.2.1:80, ALERT, Port scanThe external party is reporting attacks coming from abc-company.com. Which of the following is the reason the ABC company's security administrator is unable todetermine the origin of the attack?
  • A. A NIDS was used in place of a NIPS.
  • B. The log is not in UTC.
  • C. The external party uses a firewall.
  • D. ABC company uses PAT.
Correct Answer: D
QUESTION 4Which of the following security devices can be replicated on a Linux based computer using IP tables to inspect and properly handle network based traffic?
  • A. Sniffer
  • B. Router
  • C. Firewall
  • D. Switch
Correct Answer: C
QUESTION 5Which of the following firewall types inspects Ethernet traffic at the MOST levels of the OSI model?
  • A. Packet Filter Firewall
  • B. Stateful Firewall
  • C. Proxy Firewall
  • D. Application Firewall
Correct Answer: B
QUESTION 6The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to preventunauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO's requirements?
  • A. Sniffers
  • B. NIDS
  • C. Firewalls
  • D. Web proxies
  • E. Layer 2 switches
Correct Answer: C
QUESTION 7Which of the following network design elements allows for many internal devices to share one public IP address?
  • A. DNAT
  • B. PAT
  • C. DNS
  • D. DMZ
Correct Answer: B
QUESTION 8Which of the following is a best practice when securing a switch from physical access?
  • A. Disable unnecessary accounts
  • B. Print baseline configuration
  • C. Enable access lists
  • D. Disable unused ports
Correct Answer: D
QUESTION 9Which of the following devices would be MOST useful to ensure availability when there are a large number of requests to a certain website?
  • A. Protocol analyzer
  • B. Load balancer
  • C. VPN concentrator
  • D. Web security gateway
Correct Answer: B
QUESTION 10Pete, the system administrator, wishes to monitor and limit users' access to external websites.Which of the following would BEST address this?
  • A. Block all traffic on port 80.
  • B. Implement NIDS.
  • C. Use server load balancers.
  • D. Install a proxy server.
Correct Answer: D
QUESTION 11Mike, a network administrator, has been asked to passively monitor network traffic to the company's sales websites. Which of the following would be BEST suitedfor this task?
  • A. HIDS
  • B. Firewall
  • C. NIPS
  • D. Spam filter
Correct Answer: C
QUESTION 12Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on anetwork?
  • A. HIPS on each virtual machine
  • B. NIPS on the network
  • C. NIDS on the network
  • D. HIDS on each virtual machine
Correct Answer: A
QUESTION 13Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
  • A. NIPS
  • B. HIDS
  • C. HIPS
  • D. NIDS
Correct Answer: A
QUESTION 14An administrator is looking to implement a security device which will be able to not only detect network intrusions at the organization level, but help defend againstthem as well. Which of the following is being described here?
  • A. NIDS
  • B. NIPS
  • C. HIPS
  • D. HIDS
Correct Answer: B
QUESTION 15In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?
  • A. Supervisor
  • B. Administrator
  • C. Root
  • D. Director
Correct Answer: B