Security+ Lesson5

Security+ Lesson5

Professional Development

8 Qs

quiz-placeholder

Similar activities

FinTech 12-2 NLP

FinTech 12-2 NLP

Professional Development

10 Qs

UGI skillopedia Quiz

UGI skillopedia Quiz

Professional Development

10 Qs

Explore 2022 - NSX-T 3.2 ATP

Explore 2022 - NSX-T 3.2 ATP

Professional Development

13 Qs

CySA+ Tools

CySA+ Tools

Professional Development

12 Qs

Network - Test 3

Network - Test 3

Professional Development

7 Qs

IT ENGLISH: Research Project Topics - MS Active Directory

IT ENGLISH: Research Project Topics - MS Active Directory

Professional Development

10 Qs

11142020_A+_Lesson_10_Quiz

11142020_A+_Lesson_10_Quiz

Professional Development

9 Qs

Security + Day 6 Review

Security + Day 6 Review

Professional Development

11 Qs

Security+ Lesson5

Security+ Lesson5

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 6+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of tool is often used to capture and analyze network traffic?

Network mapper

Protocol analyzer

Wireless analyzer

Database vulnerability tester

Answer explanation

Network analyzer captures and analyzes network traffic. It can read packet headers to determine traffic patterns or view protocol information in depth. It is also known as a packet analyzer or protocol analyzer.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have implemented a passive monitoring system that is designed to keep administrators aware of malicious activity and can record detected intrusions in a database and send alert notifications so that the administrators can take action. Which of the following have you implemented?

Stateful firewall

Application layer firewall

IDS

IPS

Answer explanation

You have implemented IDS as intrusion detection systems are fundamentally passive monitoring systems designed to keep administrators aware of malicious activity: they can record detected intrusions in a database and send alert notifications, but they rely on humans to take action. IDS will never delay or interrupt traffic due to a false positive.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Syslog severity levels is an error or a problem condition that is immediately harmless or correctable but might need user review?

Error

Warning

Informational

Notice

Answer explanation

The severity level is an essential concept for event logging in general. Syslog defines eight levels, ranging from emergency messages about severe error conditions to detailed information on everyday activities that can be used to troubleshoot application functions. The warning is an error or a problem condition that is immediately harmless or correctable but might need user review.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are asked to analyze the aggregated events to find useful data that might need additional human review. Which of the following SIEM software features will you use?

Log retention

Alerts

Correlation

Aggregation

Answer explanation

Correlation analyzes aggregated events to find useful data that might need additional human review. Correlation engines work by finding relationships and trends within a large volume of events, filtering out irrelevant data, and highlighting what is most likely to be of interest to administrators. For example, if an unfamiliar application is linked to a known-bad IP address, it becomes more suspect even if nothing is obviously wrong with it.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What SNMP component is a unique number corresponding to an object property that can be monitored on a managed device?

MIB

Manager

Agent

OID

Answer explanation

Object Identifier (OID) is a unique number corresponding to an object property that can be monitored on a managed device. For example, on a switch, the up or down status of a particular interface might be an object, as would be its rate of incoming traffic. (The actual value of an object is called a variable.)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following commands will display the last 30 lines of a file named logfile2.txt?

head -n 30 logfile2.txt

tail -n 30 logfile2.txt

grep -n 30 logfile2.txt

cat -n 30 logfile2.txt

Answer explanation

The tail command retrieves and displays the last part of a file. The following command will display the last 30 lines of a file named logfile2.txt:

tail -n 30 logfile2.txt

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of proxy would you use to mediate communications between LAN clients and internet servers but require client-side configuration?

Forward

Reverse

Transparent

Anonymous

Answer explanation

Forward proxies mediate communications between LAN clients and internet servers but require client-side configuration. They’re often used on small but heavily secured networks.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your department has implemented a decoy having no useful resources and isolated it from the rest of the network so that compromising it won’t even be useful for mounting an inside attack. What technique is being used?

NGFW

IPS

Honeypot

Anomaly analysis

Answer explanation

A honeypot system is designed to be attractive and accessible to attackers. It might be completely open, or it might have an outwardly reasonable but flawed or inadequate level of security. In truth, it’s a decoy: the honeypot has no useful resources, and it’s isolated from the rest of the network (in a DMZ, for example) so that compromising it won’t even be useful for mounting an inside attack. Instead, it’s monitored to gather information on attackers without actually risking the consequences of an attack on real systems or other network locations. More sophisticated decoys live right among functional systems and files, but since legitimate users never access them, unexpected communications are automatically suspicious.