Security+ Lesson5

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 6+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of tool is often used to capture and analyze network traffic?
Network mapper
Protocol analyzer
Wireless analyzer
Database vulnerability tester
Answer explanation
Network analyzer captures and analyzes network traffic. It can read packet headers to determine traffic patterns or view protocol information in depth. It is also known as a packet analyzer or protocol analyzer.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have implemented a passive monitoring system that is designed to keep administrators aware of malicious activity and can record detected intrusions in a database and send alert notifications so that the administrators can take action. Which of the following have you implemented?
Stateful firewall
Application layer firewall
IDS
IPS
Answer explanation
You have implemented IDS as intrusion detection systems are fundamentally passive monitoring systems designed to keep administrators aware of malicious activity: they can record detected intrusions in a database and send alert notifications, but they rely on humans to take action. IDS will never delay or interrupt traffic due to a false positive.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following Syslog severity levels is an error or a problem condition that is immediately harmless or correctable but might need user review?
Error
Warning
Informational
Notice
Answer explanation
The severity level is an essential concept for event logging in general. Syslog defines eight levels, ranging from emergency messages about severe error conditions to detailed information on everyday activities that can be used to troubleshoot application functions. The warning is an error or a problem condition that is immediately harmless or correctable but might need user review.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are asked to analyze the aggregated events to find useful data that might need additional human review. Which of the following SIEM software features will you use?
Log retention
Alerts
Correlation
Aggregation
Answer explanation
Correlation analyzes aggregated events to find useful data that might need additional human review. Correlation engines work by finding relationships and trends within a large volume of events, filtering out irrelevant data, and highlighting what is most likely to be of interest to administrators. For example, if an unfamiliar application is linked to a known-bad IP address, it becomes more suspect even if nothing is obviously wrong with it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What SNMP component is a unique number corresponding to an object property that can be monitored on a managed device?
MIB
Manager
Agent
OID
Answer explanation
Object Identifier (OID) is a unique number corresponding to an object property that can be monitored on a managed device. For example, on a switch, the up or down status of a particular interface might be an object, as would be its rate of incoming traffic. (The actual value of an object is called a variable.)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following commands will display the last 30 lines of a file named logfile2.txt?
head -n 30 logfile2.txt
tail -n 30 logfile2.txt
grep -n 30 logfile2.txt
cat -n 30 logfile2.txt
Answer explanation
The tail command retrieves and displays the last part of a file. The following command will display the last 30 lines of a file named logfile2.txt:
tail -n 30 logfile2.txt
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of proxy would you use to mediate communications between LAN clients and internet servers but require client-side configuration?
Forward
Reverse
Transparent
Anonymous
Answer explanation
Forward proxies mediate communications between LAN clients and internet servers but require client-side configuration. They’re often used on small but heavily secured networks.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your department has implemented a decoy having no useful resources and isolated it from the rest of the network so that compromising it won’t even be useful for mounting an inside attack. What technique is being used?
NGFW
IPS
Honeypot
Anomaly analysis
Answer explanation
A honeypot system is designed to be attractive and accessible to attackers. It might be completely open, or it might have an outwardly reasonable but flawed or inadequate level of security. In truth, it’s a decoy: the honeypot has no useful resources, and it’s isolated from the rest of the network (in a DMZ, for example) so that compromising it won’t even be useful for mounting an inside attack. Instead, it’s monitored to gather information on attackers without actually risking the consequences of an attack on real systems or other network locations. More sophisticated decoys live right among functional systems and files, but since legitimate users never access them, unexpected communications are automatically suspicious.
Similar Resources on Wayground
7 questions
Работа с файлами и каталогами в командной строке

Quiz
•
Professional Development
10 questions
How are you doing?

Quiz
•
Professional Development
12 questions
Security+ Lesson1

Quiz
•
Professional Development
12 questions
CyberAnalysis - Дорешивание ВМ по правилам AD

Quiz
•
Professional Development
9 questions
RSE_Chapter8_DHCP

Quiz
•
KG - Professional Dev...
10 questions
Pretest Sharing Session HLD and LLD FBB Core Area 4 Telkomsel

Quiz
•
Professional Development
10 questions
CDP DIS 2023

Quiz
•
Professional Development
8 questions
Administration Windows 6 - PowerShell

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade