
Chapter 12: Network Security
Presentation
•
Computers
•
11th Grade
•
Practice Problem
•
Hard
Aiden Moore
FREE Resource
7 Slides • 58 Questions
1
Multiple Choice
1. Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An unintentional threat actor (the most common threat).
A good individual who tries to help a company see their vulnerabilities.
An attacker with lots of resources and money at their disposal.
2
Multiple Choice
2. Which of the following is an example of an internal threat?
A server backdoor allows an attacker on the internet to gain access to the intranet site.
A delivery man is able to walk into a controlled area and steal a laptop.
A user accidentally deletes the new product designs.
A water pipe in the server room breaks.
3
Multiple Choice
3. Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?
PPP
Remote Desktop
SSH
SLIP
4
Multiple Choice
4. Which of the following protocols can you use to securely manage a network device from a remote connection?
SFTP
TLS
Telnet
SSH
5
Multiple Choice
5. Which protocol does HTTPS use to offer greater security for web transactions?
SSL
CHAP
PAP
IPsec
6
Multiple Choice
6. You want to allow traveling users to connect to your private network through the internet. Users will connect from various locations, including airports, hotels, and public access points (like coffee shops and libraries). As such, you won't be able to configure the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols is MOST likely to be allowed through the widest number of firewalls?
IPsec
L2TP
PPTP
SSL
7
Multiple Select
7. Which of the following protocols are often added to other protocols to provide secure data transmission? (Select two.)
SMTP
SNMP
SSL
HTTPS
TLS
8
Multiple Choice
8. Which of the following intrusion detection and prevention systems uses fake resources to entice intruders by displaying a vulnerability, configuration flaw, or valuable data?
Zombie
Botnet
Trojan horse
Honeypot
9
Multiple Select
Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the following main intrusion detection and prevention goals? (Select two.)
Entices attackers to reveal their IDS signatures, which can then be matched to known attack patterns.
Lures attackers into a non-critical network segment where their actions are passively monitored and logged, after which their connection is simply dropped.
Offers attackers a target that occupies their time and attention while distracting them from valid resources.
Reveals information about an attacker's methods and gathers evidence for identification or prosecution purposes.
Detects anomalous behavior that varies from standard activity patterns, also referred to as heuristic recognition.
10
Multiple Choice
10. Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the internet through airport and hotel networks.
You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless antivirus software and the latest operating system patches have been installed.
Which solution should you use?
VLAN
Screened subnet
NIDS
NAC
NAT
11
Multiple Choice
11. A network utilizes a network access control (NAC) solution to defend against malware.
When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.
What is this process called?
Port security
Remediation
Quarantine
Posture assessment
12
Multiple Choice
12. When analyzing assets, which analysis method assigns financial values to assets?
Acceptance
Quantitative
Qualitative
Transfer
13
Multiple Choice
13. What is the main difference between vulnerability scanning and penetration testing?
Vulnerability scanning is performed within the security perimeter; penetration testing is performed outside of the security perimeter.
Vulnerability scanning is performed with a detailed knowledge of the system; penetration testing starts with no knowledge of the system.
he goal of vulnerability scanning is to identify potential weaknesses; the goal of penetration testing is to attack a system.
Vulnerability scanning uses approved methods and tools; penetration testing uses hacking tools.
14
Multiple Choice
14. A security administrator is conducting a penetration test on a network. She connects a notebook system running Linux to the wireless network and then uses Nmap to probe various network hosts to see which operating system they are running.
Which process did the administrator use for the penetration test in this scenario?
Firewalking
Passive fingerprinting
Active fingerprinting
Network enumeration
15
Question 15 (Part 1)
Drag each penetration test characteristic on the left to the appropriate penetration test name on the right.
Characteristics
- The tester has no prior knowledge of the target system.
- The tester does not have prior information about the system, and the administrator has no knowledge that the test is being performed.
- The tester has the same amount of information that would be available to a typical insider in the organization.
- Either the attacker has prior knowledge about the target system or the administrator knows that the test is being performed.
- The tester has detailed information about the target system prior to starting the test.
Name
Known Test [ ]
Partially Known Test [ ]
Unknown test [ ]
Single-blind test [ ]
Double-blind test [ ]
16
Question 15 (Part 2)
Answers
Known Test [ The tester has detailed information about the target system prior to starting the test. ]
Partially Known Test [ The tester has the same amount of information that would be available to a typical insider in the organization. ]
Unknown test [ The tester has no prior knowledge of the target system. ]
Single-blind test [ Either the attacker has prior knowledge about the target system or the administrator knows that the test is being performed. ]
Double-blind test [ The tester does not have prior information about the system, and the administrator has no knowledge that the test is being performed. ]
17
Multiple Choice
16. Which SIEM component is responsible for gathering all event logs from configured devices and securely sending them to the SIEM system?
Data handling
Collectors
Security automation
SIEM alerts
18
Multiple Choice
17. Which of the following Security Orchestration, Automation, and Response (SOAR) system components helps to document the processes and procedures that are to be used by a human during a manual intervention?
Orchestration
Playbook
Response
Runbook
19
Multiple Choice
18. You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services.
Which tool should you use?
IDS
Port scanner
System logs
IPS
Packet sniffer
20
Multiple Choice
19. A security administrator logs on to a Windows server on her organization's network. Then she runs a vulnerability scan on that server.
Which type of scan did she conduct in this scenario?
Credentialed scan
Intrusive scan
Non-credentialed scan
Non-intrusive scan
21
Multiple Choice
20. You want to be able to identify the services running on a set of servers on your network. Which tool would BEST give you the information you need?
Protocol analyzer
Vulnerability scanner
Port scanner
Network mapper
22
Multiple Choice
21. Five salespeople work out of your office. They frequently leave their laptops on the desks in their cubicles. You are concerned that someone might walk by and take one of these laptops.
Which of the following is the BEST way to address your concerns?
Require strong passwords in the Local Security Policy.
Implement screensaver passwords.
Use cable locks to chain the laptops to the desks.
Encrypt all company data on the hard drives.
23
Multiple Choice
22. What is the primary benefit of CCTV?
Expands the area visible to security guards.
Reduces the need for locks and sensors on doors.
Increases security protection throughout an environment.
Provides a corrective control.
24
Multiple Choice
23. Which of the following CCTV types would you use in areas with little or no light?
A camera with a high LUX rating
PTZ
C-mount
Infrared
25
Question 24 (Part 1)
Match each physical security control on the left with an appropriate example of that control on the right. Each security control may be used once, more than once, or not at all.
Controls
- Perimeter barrier
- Protected cable distribution
- Safety
- Door locks
- Physical access control
Name
Hardened carrier [ ]
Biometric authentication [ ]
Barricades [ ]
Emergency escape plans [ ]
Alarmed carrier [ ]
Anti-passback system [ ]
Emergency lighting [ ]
Exterior floodlights [ ]
26
Question 24 (Part 2)
Answers
Hardened carrier [ Protected cable distribution ]
Biometric authentication [ Door locks ]
Barricades [ Perimeter barrier ]
Emergency escape plans [ Safety ]
Alarmed carrier [ Protected cable distribution ]
Anti-passback system [ Physical access control ]
Emergency lighting [ Safety ]
Exterior floodlights [ Perimeter barrier ]
27
Multiple Choice
25. You want to use CCTV as a preventative security measure. Which of the following is a requirement for your plan?
Low LUX or infrared camera
PTZ camera
Security guards
Sufficient lighting
28
Multiple Choice
26. Which of the following is the MOST important way to prevent console access to a network switch?
Set the console and enable secret passwords.
Implement an access list to prevent console connections.
Disconnect the console cable when not in use.
Keep the switch in a room that is locked by a keypad.
29
Multiple Choice
27. Which of the following controls is an example of a physical access control method?
Passwords
Access control lists with permissions
Smart cards
New hire background checks
Locks on doors
30
Multiple Choice
28. Which of the following can you use to stop piggybacking from occurring at a front entrance where employees swipe smart cards to gain entry?
Use key locks rather than electronic locks.
Use weight scales.
Deploy a mantrap.
Install security cameras.
31
Multiple Select
29. You are an IT consultant and are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following:
When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock.
The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet.
She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media.
You notice the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace.
You notice that a router/firewall-content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks.
Which security-related recommendations should you make to this client? (Select two.)
Replace the key lock on the server closet with a card reader.
Control access to the work area with locking doors and card readers.
Use separate dedicated network perimeter security devices instead of an all-in-one device.
Replace the USB hard disks used for server backups with a tape drive.
Relocate the switch to the locked server closet.
32
Multiple Choice
30. Which of the following is a secure doorway that can be used with a mantrap to allow an easy exit but actively prevents re-entrance through the exit portal?
Electronic access control doors
Egress mantraps
Turnstiles
Locked doors with interior unlock push bars
33
Multiple Choice
31. An organization's receptionist received a phone call from an individual claiming to be a partner in a high-level project and requesting sensitive information. Which type of social engineering is this individual engaging in?
Commitment
Social validation
Persuasive
Authority
34
Multiple Choice
32. What is the primary countermeasure to social engineering?
Awareness
A written security policy
Traffic filters
Heavy management oversight
35
Question 33 (Part 1)
Match each social engineering description on the left with the appropriate attack type on the right.
Description
- An attacker enters a secure building by following an authorized employee through a secure door without providing identification.
- An attacker searches through an organization's trash for sensitive information.
- An attacker uses a telephone to convince target individuals to reveal their credit card information.
- An attacker gathers personal information about the target individual, who is a CEO.
- An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information.
- An attacker gathers personal information about the target individual in an organization.
Name
Phishing [ ]
Whaling [ ]
Spear phishing [ ]
Dumpster diving [ ]
Piggybacking [ ]
Vishing [ ]
36
Question 33 (Part 2)
Answers
Phishing [ An attacker sends an email pretending to be from a trusted organization, asking users to access a website to verify personal information. ]
Whaling [ An attacker gathers personal information about the target individual, who is a CEO. ]
Spear phishing [ An attacker gathers personal information about the target individual in an organization. ]
Dumpster diving [ An attacker searches through an organization's trash for sensitive information. ]
Piggybacking [ An attacker enters a secure building by following an authorized employee through a secure door without providing identification. ]
Vishing [ An attacker uses a telephone to convince target individuals to reveal their credit card information. ]
37
Multiple Choice
34. What is the definition of any attack involving human interaction of some kind?
Social engineering
An opportunistic attack
An authorized hacker
Attacker manipulation
38
Multiple Choice
35. Dumpster diving is a low-tech way of gathering information that may be useful for gaining unauthorized access or as a starting point for more advanced attacks. How can a company reduce the risk associated with dumpster diving?
Secure all terminals with screensaver passwords.
Establish and enforce a document destruction policy.
Mandate the use of Integrated Windows Authentication.
Create a strong password policy.
39
Multiple Choice
36. You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email says that as part of a system upgrade, you need enter your username and password in a new website so you can manage your email and spam using the new service.
What should you do?
Verify that the email was sent by the administrator and that this new service is legitimate.
Delete the email.
Click on the link in the email and follow the directions to enter your login information.
Open a web browser, type in the URL included in the email, and follow the directions to enter your login credentials.
Click on the link in the email and look for company graphics or information before you enter the login information.
40
Multiple Choice
37. Which of the following is a common social engineering attack?
Hoax virus information emails.
Logging on with stolen credentials.
Distributing false information about your organization's financial status.
Using a sniffer to capture network traffic.
41
Multiple Choice
38. On your way into the back entrance of your work building one morning, a man dressed as a plumber asks you to let him in so he can fix the restroom. What should you do?
Let him in.
Tell him no and quickly close the door.
Direct him to the front entrance and instruct him to check in with the receptionist.
Let him in and help him find the restroom. Then let him work.
42
Multiple Select
39. Which of the following are examples of social engineering attacks? (Select two.)
Dumpster diving
Shoulder surfing
Port scanning
War dialing
Impersonation
43
Multiple Choice
40. A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule.
Which type of attack BEST describes the scenario?
MAC spoofing
Whaling
Passive
Masquerading
44
Multiple Choice
41. While browsing the internet, you notice that the browser displays ads linked to recent keyword searches you performed.
Which attack type is this an example of?
Zombie
Logic bomb
Adware
Worm
45
Multiple Choice
42. What should you try first if your antivirus software does not detect and remove a virus?
Search for and delete the file you believe to be infected.
Scan the computer using another virus detection program.
Set the read-only attribute of the file you believe to be infected.
Update your virus detection software.
46
Multiple Choice
43. Which of the following best describes spyware?
It is a malicious program that is disguised as legitimate software.
It monitors user actions that denote personal preferences and then sends pop-ups and ads to the user that match their tastes.
It monitors the actions you take on your machine and sends the information back to its originating source.
It is a program that attempts to damage a computer system and replicate itself to other computer systems.
47
Multiple Choice
44. What is the main difference between a worm and a virus?
A worm requires an execution mechanism to start, while a virus can start itself.
A worm can replicate itself, while a virus requires a host for distribution.
A worm is restricted to one system, while a virus can spread from system to system.
A worm tries to gather information, while a virus tries to destroy data.
48
Multiple Choice
45. Which of the following BEST describes the key difference between DoS and DDoS?
Sends a large number of legitimate-looking requests.
Attackers use numerous computers and connections.
The target server cannot manage the capacity.
Results in the server being inaccessible to users.
49
Multiple Choice
46. Which type of denial-of-service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly maps hostnames to IP addresses?
Spam
DNS poisoning
SYN flood
ARP poisoning
50
Multiple Choice
47. Which of the following is an attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Brute force attack
On-path attack
Privilege escalation
Denial-of-service attack
51
Multiple Choice
48. You are using a password attack that tests every possible keystroke for each single key in a password until the correct one is found. Which of the following technical password attacks are you using?
Keylogger
Brute force attack
Pass-the-hash attack
Password sniffing
52
Multiple Choice
49. Which of the following is a text file that a website stores on a client's hard drive to track and record information about the user?
Mobile code
Certificate
Cookie
Digital signature
53
Multiple Choice
50. You are cleaning your desk at work. You toss several stacks of paper in the trash, including a sticky note with your password written on it. Which of the following types of non-technical password attacks have you enabled?
Dumpster diving
Shoulder surfing
Social engineering
Password guessing
54
Multiple Choice
51. As you are helping a user with a computer problem, you notice that she has written her password on a note stuck to her computer monitor. You check your company's Password Policy and find that the following settings are currently required:
Minimum password length = 10
Minimum password age = 4
Maximum password age = 30
Password history = 6
Account lockout clipping level = 3
Require complex passwords that include numbers and symbols
Which of the following is the best action to take to make remembering passwords easier so that the user no longer has to write their password down?
Decrease the minimum password length.
Increase the account lockout clipping level.
Remove the complex password requirement.
Implement end user training.
Increase the maximum password age.
55
Multiple Choice
52. A router on the border of your network detects a packet with a source address from an internal client, but the packet was received on the internet-facing interface.
Which attack form is this an example of?
Spoofing
Spamming
Sniffing
Snooping
56
Multiple Choice
53. What is spoofing?
Spying on private information or communications.
Sending a victim unwanted and unrequested email messages.
Changing or falsifying information in order to mislead or re-direct traffic.
Capturing network packets in order to examine the contents.
57
Multiple Choice
54. Which type of activity changes or falsifies information in order to mislead or re-direct traffic?
Snooping
Spoofing
Spamming
Sniffing
58
Multiple Choice
55. Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on the network?
MAC spoofing
MAC flooding
ARP poisoning
Port mirroring
59
Multiple Choice
56. Which of the following attacks can also be used to perform denial of service (DoS) attacks?
ARP spoofing
Null session
Hijacking
MAC flooding
60
Multiple Choice
57. Using sniffers has become one way for an attacker to view and gather network traffic. If an attacker overcomes your defenses and obtains network traffic, which of the following is the BEST countermeasure for securing the captured network traffic?
Eliminate unnecessary system applications.
Implement acceptable use policies.
Use intrusion detection countermeasures.
Use encryption for all sensitive traffic.
61
Multiple Choice
58. Your network administrator is configuring settings so the switch shuts down a port when the max number of MAC addresses is reached. What is the network administrator taking countermeasures against?
Spoofing
Sniffing
Filtering
Hijacking
62
Multiple Choice
59. Which of the following is the MOST effective protection against IP packet spoofing on a private network?
Antivirus scanners
Host-based IDS
Ingress and egress filters
Digital signatures
63
Multiple Choice
60. Which of the following describes an on-path attack?
A person convinces an employee to reveal their login credentials over the phone.
A false server intercepts communications from a client by impersonating the intended server.
A system constructs an IP packet that is larger than the valid size.
A person plants malicious code on a system, where the code waits for a triggering event before activating.
64
Multiple Choice
61. Which of the following attack types consists of capturing packets as they travel from one host to another with the intent of altering the contents?
Passive logging
Spamming
On-path
Spoofing
65
Labs that will be on the test
12.3.3 Implement Physical Security
12.4.5 Respond to Social Engineering Exploits
12.6.4 Poison ARP and Analyze with Wireshark
1. Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An unintentional threat actor (the most common threat).
A good individual who tries to help a company see their vulnerabilities.
An attacker with lots of resources and money at their disposal.
Show answer
Auto Play
Slide 1 / 65
MULTIPLE CHOICE
Similar Resources on Wayground
60 questions
3.2 Procés cinematogràfic i creació audiovisual
Lesson
•
11th Grade
59 questions
20221122 PKB IN-3 UP 10
Lesson
•
10th Grade
60 questions
PROG06 - ARITHMENTIC OPERATORS AND EXPRESSIONS
Lesson
•
11th Grade
60 questions
ÔN TẬP CHƯƠNG 1 GT12
Lesson
•
KG
61 questions
Civil War
Lesson
•
11th Grade
60 questions
Chapter 10 Plate Tectonics
Lesson
•
10th Grade
62 questions
Unit 4 Lesson 2 Electron Configurations
Lesson
•
10th - 12th Grade
61 questions
File Explorer
Lesson
•
12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Factor Quadratic Expressions with Various Coefficients
Quiz
•
9th - 12th Grade
10 questions
Evaluating Piecewise Functions Practice
Quiz
•
11th Grade
18 questions
Success Strategies
Quiz
•
9th - 12th Grade