Sec  + CH.3 Pre-Assessment

Sec + CH.3 Pre-Assessment

Professional Development

7 Qs

quiz-placeholder

Similar activities

Git - Github - GitHub Pages

Git - Github - GitHub Pages

Professional Development

11 Qs

CompTIA Security+ 11-20

CompTIA Security+ 11-20

Professional Development

10 Qs

System Logging Linux

System Logging Linux

Professional Development

10 Qs

KSK2023 - 2

KSK2023 - 2

Professional Development

10 Qs

CEH Pre Assessment

CEH Pre Assessment

Professional Development

10 Qs

Linux

Linux

Professional Development

10 Qs

Networking Fundamentals - Quiz 1 - Winter 2024

Networking Fundamentals - Quiz 1 - Winter 2024

Professional Development

10 Qs

Ulangan AIJ Bab 3 XII TKJ

Ulangan AIJ Bab 3 XII TKJ

1st Grade - Professional Development

10 Qs

Sec  + CH.3 Pre-Assessment

Sec + CH.3 Pre-Assessment

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Prem Jadhwani

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa uses a Linux system to regularly connect to a remote server named

gcga with a secure ssh connection. However, the ssh account has a complex

password, and she wants to avoid using it without sacrificing security.

Which of the following commands would she use as a FIRST step when

creating a passwordless login with the remote system?

ssh-copy-id -i ~.ssh/id_rsa.pub lisa@gcga

chmod 644 ~/.ssh/id_rsa

ssh-keygen -t rsa

ssh root@gcga

Answer explanation

C is correct. The first step would be to enter ssh-keygen -t rsa at the

terminal. This creates an RSA-based key pair (a private key and a public

key). The public key’s location and the name is ~.ssh/id_rsa.pub, and the

private key’s location and the name is ~/.ssh/id_rsa. The second step is to

copy the public key to the remote server using the command ssh-copy-id -i

~.ssh/id_rsa.pub lisa@gcga. The private key should always stay private,

but the chmod 644 command makes it readable by everyone, so it shouldn’t

be used. The ssh command connects to the remote server using Secure Shell

(SSH). If the key pair is in place, it would use the key pair for

authentication and not require the complex password. The ssh-keygen

command is a utility within the OpenSSH suite of tools. See Chapter 3.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization plans to deploy a server in the screened subnet that

will perform the following functions:

Identify mail servers

Provide data integrity

Prevent poisoning attacks

Respond to requests for A and AAAA records

Which of the following will BEST meet these requirements?

DNS

DNSSEC

TLS

ESP

Answer explanation

B is correct. Domain Name System Security Extensions (DNSSEC) add

security to DNS systems and can prevent DNS poisoning attacks by adding

data integrity to DNS records. The functions in the list indicate that the

server in the screened subnet (sometimes called a demilitarized zone or

DMZ) is a DNS server but for the DNS server to provide data integrity and

prevent DNS poisoning, it needs DNSSEC. DNSSEC uses a Resource

Record Signature (RRSIG), commonly referred to as a digital signature, to

provide data integrity and authentication for DNS replies. RRSIG can use

Transport Layer Security (TLS) to create the signature, but TLS by itself

doesn’t provide the required protection. Internet Protocol security (IPsec)

uses Encapsulating Security Payload (ESP) to encrypt data. See Chapter 3.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Your organization has added a hot site as shown in the graphic. All firewalls should enforce the following requirements:

1) Use only secure protocols for remote management

2) Block cleartext web traffic

Users in the hot site are unable to access websites in the Internet. The

following graphic shows the current rules configured in Firewall 3. You’re asked to verify the rules are configured correctly. Which rule, if any, should be changed in Firewall 3?

HTTPS Outbound

HTTP Outbound

DNS

Telnet

SSH

Answer explanation

C is correct. The Domain Name System (DNS) rule should be changed

because the source IP address is incorrect. It should be 10.0.3.0/24 instead

of 10.0.1.0/24. All other rules are configured correctly. See Chapter 3.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bart incorrectly wired a switch in your organization’s network. It

effectively disabled the switch as though it was a victim of a denial-of-

service attack. Which of the following should be done to prevent this

situation in the future?

Install an IDS.

Only use Layer 2 switches.

Install SNMPv3 on the switches.

Implement STP or RSTP.

Answer explanation

D is correct. Spanning Tree Protocol (STP) and Rapid STP (RSTP) both

prevent switching loop problems. It’s rare for a wiring error to take down a

switch. However, if two ports on a switch are connected to each other, it

creates a switching loop and effectively disables the switch. An intrusion

detection system (IDS) will not prevent a switching loop. Layer 2 switches

are susceptible to this problem. Administrators use Simple Network

Management Protocol version 3 (SNMPv3) to manage and monitor devices,

but it doesn’t prevent switching loops. See Chapter 3.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Maggie is a sales representative for a software company. While in a

coffee shop, she uses her laptop to connect to the public Wi-Fi, check her

work emails, and upload details of a recent sale. Which of the following

would she use to prevent other devices on the public network from

accessing her laptop? (Choose the BEST two choices.)

TPM

HSM

Firewall

DLP

VPN

Answer explanation

C and E are correct. A firewall and a virtual private network (VPN)

would prevent other devices from accessing her laptop. A host-based

firewall provides primary protection. The VPN encrypts all of her Internet-

based traffic going over the public Wi-Fi. A Trusted Platform Module

(TPM) provides full drive encryption and would protect the data if someone

accessed the laptop, but it doesn’t prevent access. A hardware security

module (HSM) is a removable device that can generate and store RSA keys

used with servers. A data loss prevention (DLP) device helps prevent

unauthorized data from leaving a network, but it doesn’t prevent access. See

Chapter 3.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization wants to combine some of the security controls used

to control incoming and outgoing network traffic. At a minimum, the

solution should include stateless inspection, malware inspection, and a

content filter. Which of the following BEST meets this goal?

VLAN

NAT

UTM

DNSSEC

WAF

Answer explanation

C is correct. A unified threat management (UTM) device is an advanced

firewall and combines multiple security controls into a single device such as

stateless inspection, malware inspection, and a content filter. None of the

other answers include these components. You can configure a virtual local

area network (VLAN) on a switch to provide network segmentation.

Network Address Translation (NAT) translates public IP addresses to

private IP addresses and private addresses back to public IP addresses.

Domain Name System Security Extensions (DNSSEC) is a suite of

extensions for DNS that provides validation for DNS responses. A web

application firewall (WAF) protects a web server from Internet-based

attacks. See Chapter 3.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators are deploying a new Linux server in the screened subnet.

After it is installed, they want to manage it from their desktop computers

located within the organization’s private network. Which of the following

would be the BEST choice to meet this need?

Forward proxy server

Reverse proxy server

Web application firewall

Jump server

Answer explanation

D is correct. A jump server is a server placed between different security

zones, such as an internal network and a screened subnet (sometimes called

a demilitarized zone or DMZ) and is used to manage devices in the other

security zone. In this scenario, administrators could connect to the jump

server with Secure Shell (SSH) and then connect to the Linux server using

SSH forwarding on the jump server. A forward proxy server (often called a

proxy server) is used by internal clients to access Internet resources, not

resources in the screened subnet. Reverse proxy servers accept traffic from

the Internet, not the internal network, and forward the traffic to one or more

internal web servers. A web application firewall (WAF) protects a web

server from Internet-based attacks but isn’t used to control traffic between

an internal network and the screened subnet. See Chapter 3.