Sec + CH.3 Pre-Assessment

Quiz
•
Computers
•
Professional Development
•
Hard

Prem Jadhwani
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa uses a Linux system to regularly connect to a remote server named
gcga with a secure ssh connection. However, the ssh account has a complex
password, and she wants to avoid using it without sacrificing security.
Which of the following commands would she use as a FIRST step when
creating a passwordless login with the remote system?
ssh-copy-id -i ~.ssh/id_rsa.pub lisa@gcga
chmod 644 ~/.ssh/id_rsa
ssh-keygen -t rsa
ssh root@gcga
Answer explanation
C is correct. The first step would be to enter ssh-keygen -t rsa at the
terminal. This creates an RSA-based key pair (a private key and a public
key). The public key’s location and the name is ~.ssh/id_rsa.pub, and the
private key’s location and the name is ~/.ssh/id_rsa. The second step is to
copy the public key to the remote server using the command ssh-copy-id -i
~.ssh/id_rsa.pub lisa@gcga. The private key should always stay private,
but the chmod 644 command makes it readable by everyone, so it shouldn’t
be used. The ssh command connects to the remote server using Secure Shell
(SSH). If the key pair is in place, it would use the key pair for
authentication and not require the complex password. The ssh-keygen
command is a utility within the OpenSSH suite of tools. See Chapter 3.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization plans to deploy a server in the screened subnet that
will perform the following functions:
Identify mail servers
Provide data integrity
Prevent poisoning attacks
Respond to requests for A and AAAA records
Which of the following will BEST meet these requirements?
DNS
DNSSEC
TLS
ESP
Answer explanation
B is correct. Domain Name System Security Extensions (DNSSEC) add
security to DNS systems and can prevent DNS poisoning attacks by adding
data integrity to DNS records. The functions in the list indicate that the
server in the screened subnet (sometimes called a demilitarized zone or
DMZ) is a DNS server but for the DNS server to provide data integrity and
prevent DNS poisoning, it needs DNSSEC. DNSSEC uses a Resource
Record Signature (RRSIG), commonly referred to as a digital signature, to
provide data integrity and authentication for DNS replies. RRSIG can use
Transport Layer Security (TLS) to create the signature, but TLS by itself
doesn’t provide the required protection. Internet Protocol security (IPsec)
uses Encapsulating Security Payload (ESP) to encrypt data. See Chapter 3.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your organization has added a hot site as shown in the graphic. All firewalls should enforce the following requirements:
1) Use only secure protocols for remote management
2) Block cleartext web traffic
Users in the hot site are unable to access websites in the Internet. The
following graphic shows the current rules configured in Firewall 3. You’re asked to verify the rules are configured correctly. Which rule, if any, should be changed in Firewall 3?
HTTPS Outbound
HTTP Outbound
DNS
Telnet
SSH
Answer explanation
C is correct. The Domain Name System (DNS) rule should be changed
because the source IP address is incorrect. It should be 10.0.3.0/24 instead
of 10.0.1.0/24. All other rules are configured correctly. See Chapter 3.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Bart incorrectly wired a switch in your organization’s network. It
effectively disabled the switch as though it was a victim of a denial-of-
service attack. Which of the following should be done to prevent this
situation in the future?
Install an IDS.
Only use Layer 2 switches.
Install SNMPv3 on the switches.
Implement STP or RSTP.
Answer explanation
D is correct. Spanning Tree Protocol (STP) and Rapid STP (RSTP) both
prevent switching loop problems. It’s rare for a wiring error to take down a
switch. However, if two ports on a switch are connected to each other, it
creates a switching loop and effectively disables the switch. An intrusion
detection system (IDS) will not prevent a switching loop. Layer 2 switches
are susceptible to this problem. Administrators use Simple Network
Management Protocol version 3 (SNMPv3) to manage and monitor devices,
but it doesn’t prevent switching loops. See Chapter 3.
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Maggie is a sales representative for a software company. While in a
coffee shop, she uses her laptop to connect to the public Wi-Fi, check her
work emails, and upload details of a recent sale. Which of the following
would she use to prevent other devices on the public network from
accessing her laptop? (Choose the BEST two choices.)
TPM
HSM
Firewall
DLP
VPN
Answer explanation
C and E are correct. A firewall and a virtual private network (VPN)
would prevent other devices from accessing her laptop. A host-based
firewall provides primary protection. The VPN encrypts all of her Internet-
based traffic going over the public Wi-Fi. A Trusted Platform Module
(TPM) provides full drive encryption and would protect the data if someone
accessed the laptop, but it doesn’t prevent access. A hardware security
module (HSM) is a removable device that can generate and store RSA keys
used with servers. A data loss prevention (DLP) device helps prevent
unauthorized data from leaving a network, but it doesn’t prevent access. See
Chapter 3.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization wants to combine some of the security controls used
to control incoming and outgoing network traffic. At a minimum, the
solution should include stateless inspection, malware inspection, and a
content filter. Which of the following BEST meets this goal?
VLAN
NAT
UTM
DNSSEC
WAF
Answer explanation
C is correct. A unified threat management (UTM) device is an advanced
firewall and combines multiple security controls into a single device such as
stateless inspection, malware inspection, and a content filter. None of the
other answers include these components. You can configure a virtual local
area network (VLAN) on a switch to provide network segmentation.
Network Address Translation (NAT) translates public IP addresses to
private IP addresses and private addresses back to public IP addresses.
Domain Name System Security Extensions (DNSSEC) is a suite of
extensions for DNS that provides validation for DNS responses. A web
application firewall (WAF) protects a web server from Internet-based
attacks. See Chapter 3.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Administrators are deploying a new Linux server in the screened subnet.
After it is installed, they want to manage it from their desktop computers
located within the organization’s private network. Which of the following
would be the BEST choice to meet this need?
Forward proxy server
Reverse proxy server
Web application firewall
Jump server
Answer explanation
D is correct. A jump server is a server placed between different security
zones, such as an internal network and a screened subnet (sometimes called
a demilitarized zone or DMZ) and is used to manage devices in the other
security zone. In this scenario, administrators could connect to the jump
server with Secure Shell (SSH) and then connect to the Linux server using
SSH forwarding on the jump server. A forward proxy server (often called a
proxy server) is used by internal clients to access Internet resources, not
resources in the screened subnet. Reverse proxy servers accept traffic from
the Internet, not the internal network, and forward the traffic to one or more
internal web servers. A web application firewall (WAF) protects a web
server from Internet-based attacks but isn’t used to control traffic between
an internal network and the screened subnet. See Chapter 3.
Similar Resources on Wayground
8 questions
FTP Server TERBARU

Quiz
•
Professional Development
10 questions
CompTIA Security+ 11-20

Quiz
•
Professional Development
10 questions
CEH Pre Assessment

Quiz
•
Professional Development
10 questions
Networking Fundamentals - Quiz 1 - Winter 2024

Quiz
•
Professional Development
10 questions
AWS Security - Semana 5

Quiz
•
Professional Development
12 questions
Network+ Study Group by PM

Quiz
•
Professional Development
10 questions
Basic Sysadmin

Quiz
•
Professional Development
8 questions
Remote Server Terbaru

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade