Sec + CH.3 Pre-Assessment

Quiz
•
Computers
•
Professional Development
•
Hard

Prem Jadhwani
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa uses a Linux system to regularly connect to a remote server named
gcga with a secure ssh connection. However, the ssh account has a complex
password, and she wants to avoid using it without sacrificing security.
Which of the following commands would she use as a FIRST step when
creating a passwordless login with the remote system?
ssh-copy-id -i ~.ssh/id_rsa.pub lisa@gcga
chmod 644 ~/.ssh/id_rsa
ssh-keygen -t rsa
ssh root@gcga
Answer explanation
C is correct. The first step would be to enter ssh-keygen -t rsa at the
terminal. This creates an RSA-based key pair (a private key and a public
key). The public key’s location and the name is ~.ssh/id_rsa.pub, and the
private key’s location and the name is ~/.ssh/id_rsa. The second step is to
copy the public key to the remote server using the command ssh-copy-id -i
~.ssh/id_rsa.pub lisa@gcga. The private key should always stay private,
but the chmod 644 command makes it readable by everyone, so it shouldn’t
be used. The ssh command connects to the remote server using Secure Shell
(SSH). If the key pair is in place, it would use the key pair for
authentication and not require the complex password. The ssh-keygen
command is a utility within the OpenSSH suite of tools. See Chapter 3.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization plans to deploy a server in the screened subnet that
will perform the following functions:
Identify mail servers
Provide data integrity
Prevent poisoning attacks
Respond to requests for A and AAAA records
Which of the following will BEST meet these requirements?
DNS
DNSSEC
TLS
ESP
Answer explanation
B is correct. Domain Name System Security Extensions (DNSSEC) add
security to DNS systems and can prevent DNS poisoning attacks by adding
data integrity to DNS records. The functions in the list indicate that the
server in the screened subnet (sometimes called a demilitarized zone or
DMZ) is a DNS server but for the DNS server to provide data integrity and
prevent DNS poisoning, it needs DNSSEC. DNSSEC uses a Resource
Record Signature (RRSIG), commonly referred to as a digital signature, to
provide data integrity and authentication for DNS replies. RRSIG can use
Transport Layer Security (TLS) to create the signature, but TLS by itself
doesn’t provide the required protection. Internet Protocol security (IPsec)
uses Encapsulating Security Payload (ESP) to encrypt data. See Chapter 3.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your organization has added a hot site as shown in the graphic. All firewalls should enforce the following requirements:
1) Use only secure protocols for remote management
2) Block cleartext web traffic
Users in the hot site are unable to access websites in the Internet. The
following graphic shows the current rules configured in Firewall 3. You’re asked to verify the rules are configured correctly. Which rule, if any, should be changed in Firewall 3?
HTTPS Outbound
HTTP Outbound
DNS
Telnet
SSH
Answer explanation
C is correct. The Domain Name System (DNS) rule should be changed
because the source IP address is incorrect. It should be 10.0.3.0/24 instead
of 10.0.1.0/24. All other rules are configured correctly. See Chapter 3.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bart incorrectly wired a switch in your organization’s network. It
effectively disabled the switch as though it was a victim of a denial-of-
service attack. Which of the following should be done to prevent this
situation in the future?
Install an IDS.
Only use Layer 2 switches.
Install SNMPv3 on the switches.
Implement STP or RSTP.
Answer explanation
D is correct. Spanning Tree Protocol (STP) and Rapid STP (RSTP) both
prevent switching loop problems. It’s rare for a wiring error to take down a
switch. However, if two ports on a switch are connected to each other, it
creates a switching loop and effectively disables the switch. An intrusion
detection system (IDS) will not prevent a switching loop. Layer 2 switches
are susceptible to this problem. Administrators use Simple Network
Management Protocol version 3 (SNMPv3) to manage and monitor devices,
but it doesn’t prevent switching loops. See Chapter 3.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Maggie is a sales representative for a software company. While in a
coffee shop, she uses her laptop to connect to the public Wi-Fi, check her
work emails, and upload details of a recent sale. Which of the following
would she use to prevent other devices on the public network from
accessing her laptop? (Choose the BEST two choices.)
TPM
HSM
Firewall
DLP
VPN
Answer explanation
C and E are correct. A firewall and a virtual private network (VPN)
would prevent other devices from accessing her laptop. A host-based
firewall provides primary protection. The VPN encrypts all of her Internet-
based traffic going over the public Wi-Fi. A Trusted Platform Module
(TPM) provides full drive encryption and would protect the data if someone
accessed the laptop, but it doesn’t prevent access. A hardware security
module (HSM) is a removable device that can generate and store RSA keys
used with servers. A data loss prevention (DLP) device helps prevent
unauthorized data from leaving a network, but it doesn’t prevent access. See
Chapter 3.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization wants to combine some of the security controls used
to control incoming and outgoing network traffic. At a minimum, the
solution should include stateless inspection, malware inspection, and a
content filter. Which of the following BEST meets this goal?
VLAN
NAT
UTM
DNSSEC
WAF
Answer explanation
C is correct. A unified threat management (UTM) device is an advanced
firewall and combines multiple security controls into a single device such as
stateless inspection, malware inspection, and a content filter. None of the
other answers include these components. You can configure a virtual local
area network (VLAN) on a switch to provide network segmentation.
Network Address Translation (NAT) translates public IP addresses to
private IP addresses and private addresses back to public IP addresses.
Domain Name System Security Extensions (DNSSEC) is a suite of
extensions for DNS that provides validation for DNS responses. A web
application firewall (WAF) protects a web server from Internet-based
attacks. See Chapter 3.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Administrators are deploying a new Linux server in the screened subnet.
After it is installed, they want to manage it from their desktop computers
located within the organization’s private network. Which of the following
would be the BEST choice to meet this need?
Forward proxy server
Reverse proxy server
Web application firewall
Jump server
Answer explanation
D is correct. A jump server is a server placed between different security
zones, such as an internal network and a screened subnet (sometimes called
a demilitarized zone or DMZ) and is used to manage devices in the other
security zone. In this scenario, administrators could connect to the jump
server with Secure Shell (SSH) and then connect to the Linux server using
SSH forwarding on the jump server. A forward proxy server (often called a
proxy server) is used by internal clients to access Internet resources, not
resources in the screened subnet. Reverse proxy servers accept traffic from
the Internet, not the internal network, and forward the traffic to one or more
internal web servers. A web application firewall (WAF) protects a web
server from Internet-based attacks but isn’t used to control traffic between
an internal network and the screened subnet. See Chapter 3.
Similar Resources on Wayground
11 questions
ICT Comp Arch & Sec - Lesson 4 - Software

Quiz
•
Professional Development
12 questions
Networking Fundamentals Day 3

Quiz
•
Professional Development
5 questions
Training 3 - TCP/IP Model

Quiz
•
Professional Development
10 questions
Mobile Offline Sync - OutSystems

Quiz
•
Professional Development
10 questions
Cyber Linux

Quiz
•
Professional Development
7 questions
FCP - NSE4: Capitulo 3: NAT

Quiz
•
Professional Development
12 questions
Virtual Machines Quiz

Quiz
•
Professional Development
7 questions
Network - Test 6

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
15 questions
Fun Random Trivia

Quiz
•
Professional Development
22 questions
Anne Bradstreet 1612-1672

Quiz
•
Professional Development
18 questions
Spanish Speaking Countries and Capitals

Quiz
•
KG - Professional Dev...
14 questions
Fall Trivia

Quiz
•
11th Grade - Professi...
15 questions
Disney Characters Quiz

Quiz
•
Professional Development
15 questions
Quiz to Highlight Q types & other great features in Wayground

Quiz
•
Professional Development