
Sec+ CH.4 Review Test
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Prem Jadhwani
Used 4+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A HIDS reported a vulnerability on a system based on a known attack.
After researching the alert from the HIDS, you identify the recommended
solution and begin applying it. What type of HIDS is in use?
Network-based
Signature-based
Heuristic-based
Anomaly-based
Answer explanation
B is correct. If the host-based intrusion detection system (HIDS)
identified a known issue, it is using signature-based detection (sometimes
called definition-based detection). A HIDS is not network-based but a
network-based IDS (NIDS) can also use signature-based detection.
Heuristic-based or behavior-based (sometimes called anomaly-based)
detection systems identify issues by comparing current activity against a
baseline. They can identify issues that are not previously known.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are preparing to deploy a heuristic-based detection system to
monitor network activity. Which of the following would you create first?
BPDU guard
Signatures
Baseline
Honeypot
Answer explanation
C is correct. A heuristic-based (also called behavior-based or anomaly-
based) detection system compares current activity with a previously created
baseline to detect any anomalies or changes. Signature-based systems (also
called definition-based) use signatures of known attack patterns to detect
attacks. A honeypot is a server designed to look valuable to an attacker and
can divert attacks. A Bridge Protocol Data Unit (BPDU) guard is used to
protect against BPDU-related attacks and is unrelated to this question.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lenny noticed a significant number of logon failures for administrator
accounts on the organization’s public website. After investigating it further,
he notices that most of these attempts are from IP addresses assigned to
foreign countries. He wants to implement a solution that will detect and
prevent similar attacks. Which of the following is the BEST choice?
Implement a passive NIDS.
Block all traffic from foreign countries.
Implement an inline NIPS.
Disable the administrator accounts.
Answer explanation
C is correct. An inline network-based intrusion prevention system (NIPS)
can dynamically detect, react to, and prevent attacks. An inline system is
placed inline with the traffic, and in this scenario, it can be configured to
detect the logon attempts and block the traffic from the offending IP
addresses before it reaches the internal network. A passive network-based
intrusion detection system (NIDS) is not placed inline with the traffic and
can only detect the traffic after it has reached the internal network, so it
cannot prevent the attack. If you block all traffic from foreign countries,
you will likely block legitimate traffic. You should disable administrator
accounts if they’re not needed. However, if you disable all administrator
accounts, administrators won’t be able to do required work.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa created a document called password.txt and put the usernames of
two accounts with elevated privileges. She then placed the file on her
administrator account desktop on several servers. Which of the following
BEST explains her actions?
She can use this file to retrieve the passwords if she forgets them.
This file will divert attackers from the live network.
The document is a honeyfile.
The file is needed by an application to run when the system starts.
Answer explanation
C is correct. A honeyfile is a file with a deceptive name (such as
password.txt) that will deceive an attacker and attract his attention. It is not
appropriate to place a file holding credentials on a desktop for any reason.
A honeypot or honeynet diverts attackers from the live network. A file on
an administrator’s desktop is on the live network. It is unlikely that any
application needs a file named password.txt to run. Even if an application
needed such a file, the file would be inaccessible if it is placed on an
administrator’s desktop.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is planning to upgrade the wireless network used by
employees. It will provide encrypted authentication of wireless users over
TLS. Which of the following protocols are they MOST likely
implementing?
EAP
PEAP
WPA2
WPA3
Answer explanation
B is correct. Protected EAP (PEAP) can be used for wireless
authentication and it uses Transport Layer Security (TLS) to encapsulate
and encrypt the authentication conversation within a TLS tunnel. Extensible
Authentication Protocol (EAP) is the basic framework for authentication.
By itself, EAP doesn’t provide encryption, but it can be combined with
other encryption protocols. Neither Wi-Fi Protected Access 2 (WPA2) nor
Wi-Fi Protected Access 3 (WPA3) use TLS.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa is creating a detailed diagram of wireless access points and hotspots
within your organization. What is another name for this?
Remote access VPN
Wireless footprinting
Channel overlap map
Architectural diagram
Answer explanation
B is correct. Wireless footprinting creates a detailed diagram of wireless
access points and hotspots within an organization. It typically displays a
heat map and dead spots if they exist. A remote access virtual private
network (VPN) provides access to a private network and is unrelated to this
question. Wi-Fi analyzers provide a graph showing channel overlaps but not
a diagram of wireless access points. An architectural diagram is typically
laid on top of a heat map to create the wireless footprint document, but by
itself, it shows the building layout.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are assisting a small business owner in setting up a public wireless
hotspot for her customers. She wants to allow customers to access the
hotspot without entering a password. Which of the following is MOST
appropriate for this hotspot?
Use Open mode.
Use a PSK.
Use Enterprise mode.
Disable SSID broadcast.
Answer explanation
A is correct. Open mode is the best choice of those given for a public
wireless hotspot that doesn’t require a password. A pre-shared key (PSK) is
the same as a password and the scenario says a password isn’t desired.
Enterprise mode requires each user to authenticate and is typically enabled
with a RADIUS server. If you disable service set identifier (SSID)
broadcast, it will make it harder for the customers to find the hotspot, but
unless Open mode is used, it will still require a password.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Mastering KineMaster
Quiz
•
Professional Development
10 questions
Git & Github
Quiz
•
Professional Development
11 questions
KOE034: Sensors and Instruments
Quiz
•
Professional Development
20 questions
DI (EM24) - Diseño de Contenidos (T8)
Quiz
•
University - Professi...
10 questions
Cloud computing 2
Quiz
•
Professional Development
14 questions
Linux Command Line Quiz
Quiz
•
Professional Development
11 questions
Fortnite
Quiz
•
5th Grade - Professio...
10 questions
UDC 2022
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Computers
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
