Security+ Study Guide-04 Securing Your Network

Security+ Study Guide-04 Securing Your Network

Professional Development

15 Qs

quiz-placeholder

Similar activities

Part 4.2

Part 4.2

Professional Development

20 Qs

CYBER SECURITY

CYBER SECURITY

Professional Development

20 Qs

computer science

computer science

KG - Professional Development

15 Qs

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

Part 4.3

Part 4.3

Professional Development

20 Qs

Wireless Networks

Wireless Networks

Professional Development

15 Qs

IOT_QUIZ_ATHARVA

IOT_QUIZ_ATHARVA

University - Professional Development

10 Qs

Know your device (with FOPM Objectives)

Know your device (with FOPM Objectives)

Professional Development

11 Qs

Security+ Study Guide-04 Securing Your Network

Security+ Study Guide-04 Securing Your Network

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Alejandro Hidalgo

Used 5+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it.

What type of HIDS is in use?

Network-based

Signature-based

Heuristic-based

Anomaly-based

Answer explanation

If the host-based intrusion detection system (HIDS) identified a known issue, it is using signature-based detection (sometimes called definition-based detection). A HIDS is not network-based but a network-based IDS (NIDS) can also use signature-based detection.

Heuristic-based or behavior-based (sometimes called anomaly-based) detection systems identify issues by comparing current activity against a baseline. They can identify issues that are not previously known.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are preparing to deploy a heuristic-based detection system to monitor activity. Which of the following would you create first?

BPDU guard

Signatures

Baseline

Honeypot

Answer explanation

A heuristic-based (also called behavior-based or anomaly-based) detection system compares current activity with a previously created baseline to detect any anomalies or changes.

Signature-based systems (also called definition-based) use signatures of known attack patterns to detect attacks.

A honeypot is a server designed to look valuable to an attacker and can divert attacks.

A Bridge Protocol Data Unit (BPDU) guard is used to protect against BPDU-related attacks and is unrelated to this question.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lenny noticed a significant number of logon failures for administrator accounts on the organization's public website. After investigating it further, he notices that most of these attempts are from IP addresses assigned to foreign countries. He wants to implement a solution that will detect and prevent similar attacks.

Which of the following is the BEST choice?

Implement a passive NIDS

Block all traffic from foreign countries

Implement an inline NIPS

Disable the administrator accounts

Answer explanation

An inline network-based intrusion prevention system (NIPS) can dynamically detect, react to, and prevent attacks An inline system is placed inline with the traffic, and in this scenario, it can be configured to detect the logon attempts and block the traffic from the offending IP address before it reaches the internal network.

A passive network-based intrusion detection system (NIDS) is not placed inline with the traffic and can only detect the traffic after it has reached the internal network, so it cannot prevent the attack.

If you block all traffic from foreign countries, you will likely block legitimate traffic.

You should disable administrator account is they're not needed. However, if you disable all administrator accounts, administrators won't be able to do required work.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa created a document called password.txt and put the usernames of two accounts with elevated privileges. She then placed the file on her administrator account desktop on several servers.

Which of the following BEST explains her actions?

She can use this file to retrieve the passwords if she forgets them

This file will divert attackers from the live network

The document is a honeyfile

The file is needed by an application to run when the system starts

Answer explanation

A honeyfile is a file with a deceptive name (such as password.txt) that will deceive an attacker and attract his/her attention. It is not appropriate to place a file holding credentials on a desktop for any reason.

A honeypot or honeynet diverts attackers from the live network.

A file on an administrator's desktop on the live network. It is unlikely that any application needs a file name password.txt to run. Even if an application needs such a file, the file would be inaccessible if it is placed on the administrator's desktop.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization is planning to upgrade the wireless network used by employees. It will provide encrypted authentication of wireless users over TLS.

Which of the following protocols are the MOST likely implementing?

EAP

PEAP

WPA2

WPA3

Answer explanation

Protected EAP (PEAP) can be used for wireless authentication and it uses Transport Layer Security (TLS) to encapsulate and encrypt the authentication conversation within a TLS tunnel.

Extensible Authentication Protocol (EAP) is the basic framework for authentication. By itself, EAP doesn’t provide encryption, but it can be combined with other encryption protocols.

Neither Wi-Fi Protected Access 2 (WPA2) nor Wi-Fi Protected Access 3 (WPA3) use TLS.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa is creating a detailed diagram of wireless access points and hotspots within your organization. What is another name for this?

Remote access VPN

Wireless footprinting

Channel overlap map

Architectural diagram

Answer explanation

Wireless footprinting creates a detailed diagram of wireless access points and hotspots within an organization. It typically displays a heat map and dead spots if they exist.

A remote access virtual private network (VPN) provides access to a private network and is unrelated to this question.

Wi-Fi analyzers provide a graph showing channel overlaps but not a diagram of wireless access points. An architectural diagram is typically laid on top of a heat map to create the wireless footprint document, but by itself, it shows the building layout.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are assisting a small business owner in setting up a public wireless for her customers. She wants to allow customers to access the hotspot without entering a password. Which of the following is the MOST appropriate for this hotspot?

Use Open mode

Use a PSK

A Raspberry Pi device

Rogue AP

APT

Answer explanation

Open mode is the best choice of those given for a public wireless hotspot that doesn’t require a password. A pre-shared key (PSK) is the same as a password and the scenario says a password isn’t desired. Enterprise mode requires each user to authenticate and is typically enabled with a RADIUS server. If you disable service set identifier (SSID) broadcast, it will make it harder for the customers to find the hotspot, but unless Open mode is used, it will still require a password.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?