
Sec+ CH.4 Review Test

Quiz
•
Computers
•
Professional Development
•
Hard

Prem Jadhwani
Used 4+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A HIDS reported a vulnerability on a system based on a known attack.
After researching the alert from the HIDS, you identify the recommended
solution and begin applying it. What type of HIDS is in use?
Network-based
Signature-based
Heuristic-based
Anomaly-based
Answer explanation
B is correct. If the host-based intrusion detection system (HIDS)
identified a known issue, it is using signature-based detection (sometimes
called definition-based detection). A HIDS is not network-based but a
network-based IDS (NIDS) can also use signature-based detection.
Heuristic-based or behavior-based (sometimes called anomaly-based)
detection systems identify issues by comparing current activity against a
baseline. They can identify issues that are not previously known.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are preparing to deploy a heuristic-based detection system to
monitor network activity. Which of the following would you create first?
BPDU guard
Signatures
Baseline
Honeypot
Answer explanation
C is correct. A heuristic-based (also called behavior-based or anomaly-
based) detection system compares current activity with a previously created
baseline to detect any anomalies or changes. Signature-based systems (also
called definition-based) use signatures of known attack patterns to detect
attacks. A honeypot is a server designed to look valuable to an attacker and
can divert attacks. A Bridge Protocol Data Unit (BPDU) guard is used to
protect against BPDU-related attacks and is unrelated to this question.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lenny noticed a significant number of logon failures for administrator
accounts on the organization’s public website. After investigating it further,
he notices that most of these attempts are from IP addresses assigned to
foreign countries. He wants to implement a solution that will detect and
prevent similar attacks. Which of the following is the BEST choice?
Implement a passive NIDS.
Block all traffic from foreign countries.
Implement an inline NIPS.
Disable the administrator accounts.
Answer explanation
C is correct. An inline network-based intrusion prevention system (NIPS)
can dynamically detect, react to, and prevent attacks. An inline system is
placed inline with the traffic, and in this scenario, it can be configured to
detect the logon attempts and block the traffic from the offending IP
addresses before it reaches the internal network. A passive network-based
intrusion detection system (NIDS) is not placed inline with the traffic and
can only detect the traffic after it has reached the internal network, so it
cannot prevent the attack. If you block all traffic from foreign countries,
you will likely block legitimate traffic. You should disable administrator
accounts if they’re not needed. However, if you disable all administrator
accounts, administrators won’t be able to do required work.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa created a document called password.txt and put the usernames of
two accounts with elevated privileges. She then placed the file on her
administrator account desktop on several servers. Which of the following
BEST explains her actions?
She can use this file to retrieve the passwords if she forgets them.
This file will divert attackers from the live network.
The document is a honeyfile.
The file is needed by an application to run when the system starts.
Answer explanation
C is correct. A honeyfile is a file with a deceptive name (such as
password.txt) that will deceive an attacker and attract his attention. It is not
appropriate to place a file holding credentials on a desktop for any reason.
A honeypot or honeynet diverts attackers from the live network. A file on
an administrator’s desktop is on the live network. It is unlikely that any
application needs a file named password.txt to run. Even if an application
needed such a file, the file would be inaccessible if it is placed on an
administrator’s desktop.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your organization is planning to upgrade the wireless network used by
employees. It will provide encrypted authentication of wireless users over
TLS. Which of the following protocols are they MOST likely
implementing?
EAP
PEAP
WPA2
WPA3
Answer explanation
B is correct. Protected EAP (PEAP) can be used for wireless
authentication and it uses Transport Layer Security (TLS) to encapsulate
and encrypt the authentication conversation within a TLS tunnel. Extensible
Authentication Protocol (EAP) is the basic framework for authentication.
By itself, EAP doesn’t provide encryption, but it can be combined with
other encryption protocols. Neither Wi-Fi Protected Access 2 (WPA2) nor
Wi-Fi Protected Access 3 (WPA3) use TLS.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Lisa is creating a detailed diagram of wireless access points and hotspots
within your organization. What is another name for this?
Remote access VPN
Wireless footprinting
Channel overlap map
Architectural diagram
Answer explanation
B is correct. Wireless footprinting creates a detailed diagram of wireless
access points and hotspots within an organization. It typically displays a
heat map and dead spots if they exist. A remote access virtual private
network (VPN) provides access to a private network and is unrelated to this
question. Wi-Fi analyzers provide a graph showing channel overlaps but not
a diagram of wireless access points. An architectural diagram is typically
laid on top of a heat map to create the wireless footprint document, but by
itself, it shows the building layout.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are assisting a small business owner in setting up a public wireless
hotspot for her customers. She wants to allow customers to access the
hotspot without entering a password. Which of the following is MOST
appropriate for this hotspot?
Use Open mode.
Use a PSK.
Use Enterprise mode.
Disable SSID broadcast.
Answer explanation
A is correct. Open mode is the best choice of those given for a public
wireless hotspot that doesn’t require a password. A pre-shared key (PSK) is
the same as a password and the scenario says a password isn’t desired.
Enterprise mode requires each user to authenticate and is typically enabled
with a RADIUS server. If you disable service set identifier (SSID)
broadcast, it will make it harder for the customers to find the hotspot, but
unless Open mode is used, it will still require a password.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Post Trainee Quiz

Quiz
•
Professional Development
15 questions
Wireless Networks

Quiz
•
Professional Development
11 questions
ITF - Quiz 12.2 - Windows File Sharing

Quiz
•
Professional Development
12 questions
Quiz sobre Serviços de Rede do Azure

Quiz
•
Professional Development
15 questions
Encryption

Quiz
•
Professional Development
10 questions
IT ENGLISH: Technical Terminology - ACL

Quiz
•
Professional Development
20 questions
Part 1.8

Quiz
•
Professional Development
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade