Network security Chapter 4

Network security Chapter 4

Assessment

Quiz

Instructional Technology

Professional Development

Medium

Created by

Haidir Magribi

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?
Registry Editor
Windows Defender
Microsoft Security Compliance Toolkit
Microsoft Internet Explorer

Answer explanation

The Microsoft Security Compliance Toolkit allows enterprise security administrators to download, analyze, test, edit, and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products. Internet Explorer is a web browser. Registry Editor is used to change settings in the Windows Registry. Windows Defender uses signatures to identify malicious applications.

2.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Which type of update should be prioritized even outside of a normal patching window?
Security updates
Critical updates
Monthly updates
Microsoft updates

Answer explanation

The correct answer is critical updates. These updates are often marked critical because of the severity of the exploit or how widespread it is. Microsoft, monthly, and security updates do not necessarily demand to be installed outside of a normal patching window.

3.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Prepare to Document means establishing the process you will use to document your network. Which of the following makes this documentation more useful?
Identify the choke points on the network.
Identify who is responsible for each device.
Automate administration as much as possible.
Have a printed hard copy kept in a secure location.

Answer explanation

Prepare to Document means establishing the process you will use to document your network. A useful document: Is easy to use Includes enough detail Documents the important things Uses timestamps Is protected with restricted access and possibly encryption Has a printed hard copy kept in a secure location Identifying who is responsible for each device is included in the Map Your Network milestone. Identifying the choke points on the network is included in the Protect Your Network milestone. Automating administration as much as possible is included in the Reach Your Network milestone.

4.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Documenting procedures and processes are part of which milestone in the NSA's Manageable Network Plan?
Document Your Network
Prepare to Document
Control Your Network
Reach Your Network

Answer explanation

Milestone 8 (Document Your Network) is the milestone of the plan that includes documenting procedures and processes. Milestone 1 (Prepare to Document) establishes the guidelines for how to create documentation. Milestone 4 (Reach Your Network) defines how to maintain secure access to network devices. Milestone 5 (Document Your Network) defines how to limit access to network devices.

5.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

In which milestone should you use a network scanner and then confirm the scan manually with a room-by-room walkthrough?
Reach Your Network
Prepare to Document
Map Your Network
Protect Your Network

Answer explanation

The Map Your Network milestone ensures that you are aware of all the components of the network and that you know where the physical devices are. The steps are: Create a map of the network topology. Create a list of all devices. Don't forget to include wireless devices. Use a network scanner and then confirm the scan manually with a room-by-room walkthrough. Identify who is responsible for each device and detail other information, such as IP address, service tag, and physical location. Consider using a database file to store the information. Create a list of all protocols being used on the network by using a network analyzer. Consider removing unauthorized devices and protocols from your network. The Prepare to Document milestone means establishing the process you will use to document your network. The Protect Your Network (network architecture) milestone identifies the necessary steps to protect your network. The Reach Your Network (device accessibility) milestone helps to ensure that all of the devices on your network can be easily accessed while still maintaining each device's security. Accessibility includes physical access as well as remote access.

6.

MULTIPLE CHOICE QUESTION

5 sec • 1 pt

Windows Server Update Services (WSUS) is used to accomplish which part of a manageable network?
Device accessibility
User access
Documentation
Patch management

Answer explanation

Patch management is managed by Windows Server Update Services (WSUS) by keeping Windows systems up to date. WSUS does not help with documentation, controlling user access, or ensuring devices are accessible.

7.

MULTIPLE SELECT QUESTION

5 sec • 1 pt

You have recently been hired as the new network administrator for a startup company. The company's network was implemented prior to your arrival. One of the first tasks you need to complete in your new position is to develop a manageable network plan for the network. You have already completed the first and second milestones, in which documentation procedures were identified and the network was mapped. You are now working on the third milestone, which is identifying ways to protect the network.
Physically secure high-value systems.
Create an approved application list for each network device.
Apply critical patches whenever they are released.
Set account expiration dates.
Identify and document each user on the network.

Answer explanation

In the third milestone (Protect Your Network), you should take the following steps: Identify and document each user on the network and the information he or she has access to. Identify high-value network assets. Document the trust boundaries. Identify the choke points on the network. Segregate and isolate networks. Isolate server functions. Physically secure high-value systems. Setting account expiration dates is part of the fifth milestone (Control Your Network). Applying critical patches and creating an approved application list are both tasks associated with the sixth milestone (Manage Your Network).

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?