QUESTIONS AND ANSWERS
(GRADED A+)
Which of the following is not a primary objective of information security? - ANSWER-
Privacy
A security assessment may include which of the following steps? - ANSWER-All of
the above
Security ________ are goals an organization strives to achieve through its security
efforts. - ANSWER-Objectives
Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________. -
ANSWER-the principle of least privilege
Which of the following is not a distinguishing characteristic of a WAN compared to a
LAN? - ANSWER-Has a limited geographic area
Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________. - ANSWER-separation of duties
From the perspective of computers and networks, _________ is confidence that
other users will act in accordance with your organizations - ANSWER-Trust
One of the most effective preventative techniques in network security
troubleshooting is __________. - ANSWER-installing patches and updates
Which of the following has the ultimate and final responsibility for network security in
an organization? - ANSWER-Senior management
What is a potential disadvantage of online data backups? - ANSWER-Dependency
on provider's security
What does a client/server environment have that a peer-to-peer networking
environment typically does not? - ANSWER-Server
What is another form of a honeypot? - ANSWER-Padded cell
What is not an example of containment during incident response? - ANSWER-
Confirming a breach
Which of the following do you not get with network address translation (NAT)? -
ANSWER-A static public IP address for each internal client
,Which of the following enables you to check a client computer for compliance with
security policies and either grant or deny its access to the internal network? -
ANSWER-Network access control
What is the purpose of the post-mortem review after a security assessment? -
ANSWER-Learn from mistakes.
Which IT domain includes demilitarized zones (DMZs) and intrusion detection
systems (IDS)? - ANSWER-LAN-to-WAN Domain
Which of the following could compromise network security? - ANSWER-Simplify by
assigning maximum required permissions
Which IT domain in a typical IT infrastructure typically includes routers, circuits,
switches, firewalls, and equivalent gear at remote locations? - ANSWER-WAN
Domain
Which of the following is not a network security management best practice? -
ANSWER-Implement single-factor authentication
The lack of ____________ is both a strength and weakness of workgroups. -
ANSWER-Central authority
Which of the following is not true of compliance auditing? - ANSWER-A regular
compliance audit can be used in place of an organization's security policy.
You are filtering MAC addresses on a switch by blocking only specific IP addresses.
What do you use to perform this type of filtering? - ANSWER-Black list
Which of the following must an administrator organize to ensure follow-through of a
new security plan? - ANSWER-End-user training and awareness
You can filter which type of traffic on a typical firewall? - ANSWER-Both ingress and
egress
Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability? - ANSWER-Cloud
Who performs penetration testing? - ANSWER-Ethical hackers
Which private address range is 172.16.0.0-172.31.255.255 /12? - ANSWER-Class B
A _________ is a boundary network that hosts resource servers for the public
Internet. - ANSWER-DMZ
Window locks, door locks, and security cameras are examples of which of the
following? - ANSWER-Physical security
, A ___________ is either a hardware device or a software product you deploy to
enforce the access control policy on network communications. - ANSWER-Firewall
An IDS or IPS that uses a database of signatures or patterns of known malicious
activities to detect threats is called _______________ detection. - ANSWER--
knowledge-based
_______ resolves FQDNs into the associated IP address. [hint 3 letters abbreviation]
- ANSWER-DNS
Deciding which firewall rules to define is subject to an organization's
_____________. - ANSWER-- security policy
_______________ is the process of securing or locking down a host against threats
and attacks. - ANSWER-Hardening
In which situation is a change control system most effective? - ANSWER--
Troubleshooting
_____ ________ __________are new and previously unknown attacks for which no
current specific defenses exist. [hint 3 words] - ANSWER-Zero day exploits
Regarding firewall rules, what is another name for default deny? - ANSWER-- Deny
all
______ __________ ____________ allows an attacker to eavesdrop on electronic
devices from a distance. The technique is to perfect or simple to perform, but has
been demonstrated on LCD and CRT monitors as well as keyboard cables. With
minor shielding, you can eliminate most of the risk from such an attack. - ANSWER-
Van Eck phreaking
What is an access control list (ACL)? - ANSWER-- A firewall rule or filter
Which layer of the OSI reference model handles logical addressing (IP addresses)
and routing traffic? - ANSWER-Network
What is an important thing to do regarding firewall logs? - ANSWER-- Review the log
files frequently.
Which of the following a problem for static filtering? - ANSWER-Large, unordered
rule sets
What is one of the most problematic issues with an intrusion detection system (IDS)?
- ANSWER-- False negatives
What is a network component that filters traffic between nodes? - ANSWER-Firewall
What is the primary purpose of log monitoring? - ANSWER-- Detect malicious
network activities