Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Professional Development

15 Qs

quiz-placeholder

Similar activities

Chapter 5: Network Security and Monitoring

Chapter 5: Network Security and Monitoring

University - Professional Development

15 Qs

securing networks (Cont.FTP,telnet, etc)

securing networks (Cont.FTP,telnet, etc)

Professional Development

20 Qs

Know your device (with FOPM Objectives)

Know your device (with FOPM Objectives)

Professional Development

11 Qs

DSA106.3

DSA106.3

Professional Development

12 Qs

Network+ OSI Model

Network+ OSI Model

Professional Development

11 Qs

Enumeration

Enumeration

Professional Development

10 Qs

CCNP-Tshoot-Pre-Assessment

CCNP-Tshoot-Pre-Assessment

Professional Development

15 Qs

Part 3.5

Part 3.5

Professional Development

20 Qs

Sec+ CH.3  Review Test

Sec+ CH.3 Review Test

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Prem Jadhwani

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An outside consultant performed an audit of the Municipal House of

Pancakes network. She identified a legacy protocol being used to access

browser-based interfaces on switches and routers within the network. She

recommended replacing the legacy protocol with a secure protocol to access

these network devices using the same interface. Which of the following

protocols should be implemented?

The newest fully supported version of SSL

The newest fully supported version of TLS

The newest fully supported version of LDAPS

The newest fully supported version of SNMP

Answer explanation

B is correct The newest version of Transport Layer Security (TLS)

should be implemented to access the network devices. Because the scenario

says the same interface is needed, the only possible choices are TLS or

Secure Sockets Layer (SSL). However, SSL has been deprecated and

should not be used. Lightweight Directory Access Protocol Secure

(LDAPS) is used to communicate with directories such as Microsoft Active

Directory. Simple Network Management Protocol version 3 (SNMPv3)

adds security to SNMP and encrypts the credentials sent to and from the

network devices, but it doesn’t support access via a browser interface.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization’s security policy requires that confidential data

transferred over the internal network must be encrypted. Which of the

following protocols would BEST meet this requirement?

FTP

SSH

SNMPv3

SRTP

Answer explanation

B is correct. You can use Secure Shell (SSH) to encrypt confidential data

when transmitting it over the network. Secure File Transfer Protocol

(SFTP) uses SSH to encrypt File Transfer Protocol (FTP) traffic, but FTP is

unencrypted. Simple Network Management Protocol version 3 (SNMPv3)

is used to monitor and manage network devices, not transmit data over a

network. Secure Real-Time Transport Protocol (SRTP) provides encryption,

message authentication, and integrity for voice and video, but not all data.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maggie needs to collect network device configuration information and

network statistics from devices on the network. She wants to protect the

confidentiality of credentials used to connect to these devices. Which of the

following protocols would BEST meet this need?

SSH

FTPS

SNMPv3

TLS

Answer explanation

C is correct. Simple Network Management Protocol version 3 (SNMPv3)

is a secure protocol that can monitor and collect information from network

devices. It includes strong authentication mechanisms to protect the

confidentiality of credentials. None of the other protocols listed are used to

monitor network devices. Secure Shell (SSH) provides a secure method of

connecting to devices but does not monitor them. File Transfer Protocol

Secure (FTPS) is useful for encrypting large files in transit, using Transport

Layer Security (TLS). TLS is commonly used to secure transmissions but

doesn’t include methods to monitor devices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are trying to determine what information attackers can gain about

your organization using network reconnaissance methods via the Internet.

Using a public wireless hot spot, you issue the following command:

nslookup -querytype=mx gcgapremium.com

You then see these results:

Server: UnKnown

Address: 10.0.0.1

Non-authoritative answer:

gcgapremium.com MX preference = 90, mail exchanger =

mx1.emailsrvr.com

gcgapremium.com MX preference = 20, mail exchanger =

mx2.emailsrvr.com

What does this tell you?

10.0.0.1 is the IP address of the primary mail server.

gcgapremium.com is unknown to DNS.

The mx1.emailsrvr.com is a backup mail server.

The MX servers are showing too much information to the public.

Answer explanation

C is correct. This indicates that the mx1.emailsrvr.com is a backup mail

server. The preference of mx1.emailsrvr.com is 90, which is higher than the

preference of 20 for mx2.emailsrvr.com. In other words, mx2.emailsrvr.com

is the primary email server and mx1.emailsrvr.com is the secondary email

server. The “Address: 10.0.0.1” response indicates that the address of the

Domain Name System (DNS) server that gave the response is 10.0.0.1. The

“Server: UnKnown” response indicates that the DNS server is not using

PTR records, which resolve IP addresses to hostnames. Note that

“UnKnown” looks like a typo but is the way that nslookup (short for name

server lookup) displays it. The MX records are required so that other

Internet-based mail servers can find the mail servers handling mail sent to a

domain.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrators are configuring a server within your organization’s

screened subnet. This server will have the following capabilities when it is

fully configured:

1) It will use RRSIG.

2) It will perform authenticated requests for A records.

3) It will perform authenticated requests for AAAA records.

What BEST identifies the capabilities of this server?

SSH

SNMPv3

S/MIME

DNSSEC

Answer explanation

D is correct. This is a Domain Name System (DNS) server with the

added capabilities of DNS Security Extensions (DNSSEC). DNSSEC is a

suite of extensions to DNS. It uses a Resource Record Signature (RRSIG),

commonly referred to as a digital signature, to provide data integrity and

authentication for DNS replies. A DNS server resolves hostnames to IP

addresses. Secure Shell (SSH) is commonly used to connect to remote

systems and can be used to send files in an encrypted format over a

network. Simple Network Management Protocol version 3 (SNMPv3) is

used to manage and monitor network devices. Secure/Multipurpose Internet

Mail Extensions(S/MIME) is a popular standard used to encrypt email, but

email is not mentioned in the scenario.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Maggie regularly connects to a remote server named gcga using Secure

Shell (ssh) from her Linux system. However, she has trouble remembering

the password, and she wants to avoid using it without sacrificing security.

She creates a cryptographic key pair to use instead. Which of the following

commands is the BEST choice to use after creating the key pair?

ssh-copy-id -i ~.ssh/id_rsa.pub maggie@gcga

chmod 644 ~/.ssh/id_rsa

ssh-keygen -t rsa

ssh root@gcga

Answer explanation

A is correct. After creating the key pair, she should use the ssh-copy-id

command to copy the public key to the server. The first step uses the ssh-

keygen -t rsa command. This creates an RSA-based key pair (a private key

and a public key). The public key’s location and the name is

~.ssh/id_rsa.pub, and the private key’s location and the name is

~/.ssh/id_rsa. The second step is to copy the public key to the remote server

using the command ssh-copy-id -i ~.ssh/id_rsa.pub maggie@gcga. The

private key should always stay private, but the chmod 644 command makes

it readable by everyone, so it shouldn’t be used. The ssh command connects

to the remote server using Secure Shell (ssh). However, it’s not required to

connect to the server before copying it. The ssh-copy-id command is a

utility within the OpenSSH suite of tools.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are tasked with enabling NTP on some servers within your

organization’s screened subnet. Which of the following use cases are you

MOST likely supporting with this action?

Encrypting voice and video transmissions

Providing time synchronization

Enabling email usage

Encrypting data-in-transit

Answer explanation

B is correct. The Network Time Protocol (NTP) provides time

synchronization services, so enabling NTP on servers in the screened subnet

(sometimes called a demilitarized zone or DMZ) would meet this use case.

The Secure Real-time Transport Protocol (SRTP) provides encryption,

message authentication, and integrity for audio and video over IP networks.

Protocols such as Simple Mail Transfer Protocol (SMTP), Post Office

Protocol v3 (POP3), and Internet Message Access Protocol version 4

(IMAP4) are used for email. Encrypting data isn’t relevant to time

synchronization services provided by NTP.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?