Questions
Here are a few questions to test your understanding of the chapter:
- Which is the security module that would store an e-commerce server's private key?
- DLP
- HSM
- DPI
- 802.1x
- How can I mitigate the threat of data leakage?
- Through DLP
- Through HSM
- Through DPI
- Through 802.1x
- What type of IDS would I be using if I needed to update my definition files?
- Anomaly
- Behavior
- Heuristics
- Signature
- What is the purpose of iptables on a host computer?
- Routing
- Firewall
- Switching
- Encryption
- Which protocol would be used to manage a router securely from a technician's laptop?
- Telnet
- RDP
- SSH
- FTP
- How should I protect my management interface on a switch when I need to configure it remotely? Choose two answers.
- OSPF
- OOB management
- Strong password
- RIP v2
- What is an Ethernet standard for port access protocol, used for protecting networks via authentication?
- 802.11
- 802.3
- 802.1x
- d) 802.5
- What type of connectivity will allow key personnel to maintain communication with one another and key network resources when the main network is under attack?
- OOB
- Teams
- VNC
- What is a disadvantage when using a virtual desktop infrastructure (VDI)?
- Reliance on networks
- Better use of hardware resources
- Enhanced security
- Standard operating environment (SOE)
- What is used when my contractors use a tablet or thin client to access a Windows 10 desktop in my data center?
- OOB
- MDM
- VDI
- SSH
- What type of routing will help to mitigate a DDoS attack?
- OSPF
- RTBH
- RIP
- EIGRP
- What is it when SOC staff are failing to respond to alerts due to excessive levels of alerts?
- False positive
- Alert fatigue
- False negative
- True positive
- What will I need to support on my network device in order to forward truncated network traffic to a network monitoring tool?
- NetFlow
- sFlow
- SIEM
- System Logging Protocol (Syslog)
- What type of security would I use on my layer 2 switch to isolate the finance network from the development network?
- VPN
- IPsec
- VLAN
- RTBH
- What type of servers would the security team place on the DMZ network?
- Web Application server
- SMTP Gateway
- Intranet File Server
- Finance Department Payoll Server
- What type of security label would CISA assign to the chemical sector and communications sector?
- Regulated industry
- Protected infrastructure
- SCADA
- Critical infrastructure
- What will protect my Wi-Fi network against common threats, including evil-twin/rogue APs and DDoS?
- 802.1x
- Host-based IPS (HIPS)
- Firewall
- WIPS
- What should I configure on mobile users' laptop computers to ensure they will not be vulnerable to sniffing/eavesdropping when accessing the hotel's Wi-Fi network?
- Anti-malware
- Shielding
- Cable locks
- VPN
- Which edge security appliance should be recommended for an organization that has no dedicated security team and needs multiple security protection functions?
- Router
- WAF
- UTM
- DLP
- What should be used to connect a remote government agency across public networks (note that it needs to support the NSA suite of encryption protocols)?
- VPN
- HAIPE
- VLAN
- Protected distribution