Final Test

10 September 2022
4.7 (114 reviews)
78 test answers

Unlock all answers in this set

Unlock answers (74)
question
An IDPS consists of a single device that you install between your firewall and the Internet.
answer
False
question
A weakness of a signature-based system is that it must keep state information on a possible attack.
answer
True
question
No actual traffic passes through a passive sensor; it only monitors copies of the traffic. True False
answer
True
question
An NIDPS can tell you whether an attack attempt on the host was successful.
answer
False
question
A hybrid IDPS combines aspects of NIDPS and HIDPS configurations.
answer
True
question
Which of the following is NOT a network defense function found in intrusion detection and prevention systems? a) prevention b) response c) identification d) detection
answer
c) identification
question
Which of the following is NOT a primary detection methodology? a. signature detection b. baseline detection c. anomaly detection d. stateful protocol analysis
answer
b. baseline detection
question
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following? a. training period b. baseline scanning c. profile monitoring d. traffic normalizing
answer
a. training period
question
What is an advantage of the anomaly detection method?
answer
easy to understand and less difficult to configure than a signature-based system
question
Which approach to stateful protocol analysis involves detection of the protocol in use, followed by activation of analyzers that can identify applications not using standard ports?
answer
Dynamic Application layer protocol analysis
question
Which of the following is an advantage of a signature-based detection system?
answer
each signature is assigned a number and name
question
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?
answer
heuristic
question
Which of the following is NOT a typical IDPS component?
answer
Internet gateway
question
Where is a host-based IDPS agent typically placed?
answer
on a workstation or server
question
Which IDPS customization option is a list of entities known to be harmless?
answer
whitelists
question
Which of the following is considered a problem with a passive, signature-based system?
answer
false positives
question
Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?
answer
hybrid
question
Which of the following is NOT a method used by passive sensors to monitor traffic?
answer
packet filter
question
Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?
answer
inline only
question
Which of the following is true about an HIDPS?
answer
monitors OS and application logs
question
Which of the following is true about an NIDPS versus an HIDPS?
answer
an HIDPS can detect attacks not caught by an NIDPS
question
Which of the following is an IDPS security best practice?
answer
communication between IDPS components should be encrypted
question
If you see a /16 in the header of a snort rule, what does it mean?
answer
the subnet mask is 255.255.0.0
question
Why might you want to allow extra time for setting up the database in an anomaly-based system?
answer
to allow a baseline of data to be compiled
question
Which of the following is true about the steps in setting up and using an IDPS?
answer
????
question
Firewalls can protect against employees copying confidential data from within the network.
answer
False
question
Software firewalls are usually more scalable than hardware firewalls.
answer
False
question
Stateless packet filtering keeps a record of connections that a host computer has made with other computers.
answer
False
question
Generally, connections to instant-messaging ports are harmless and should be allowed.
answer
False
question
Since ICMP messages use authentication, man-in-the-middle attacks cannot be successful.
answer
False
question
The Cisco PIX line of products is best described as which of the following?
answer
firewall appliance
question
Which of the following is a typical drawback of a free firewall program?
answer
cannot monitor traffic in real time
question
Which of the following is an advantage of hardware firewalls?
answer
not dependent on a conventional OS
question
Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.
answer
data patterns
question
What type of attack are stateless packet filters particularly vulnerable to? a. attempts to connect to ports above 1023 b. attempts to connect to the firewall c. IP spoofing attacks d. attempts to connect to ports below 1023
answer
?
question
What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?
answer
proxy server
question
At what layer of the OSI model do proxy servers generally operate?
answer
Application
question
Which element of a rule base conceals internal names and IP addresses from users outside the network?
answer
NAT
question
Which of the following is NOT among the common guidelines that should be reflected in the rule base to implement an organization's security policy? a. only authenticated traffic can access the internal network b. employees can use instant-messaging only with external network users c. the public can access the company Web servers d. employees can have restricted Internet access
answer
?
question
What is a suggested maximum size of a rule base?
answer
30 rules
question
What is considered the 'cleanup rule' on a Cisco router?
answer
implicit deny all
question
Which of the following is described as the combination of an IP address and a port number?
answer
socket
question
Which of the following is a general practice for a rule base?
answer
permit access to public servers in the DMZ
question
What service uses UDP port 53?
answer
DNS
question
Which of the following is NOT an ICMPv6 packet type that you should allow within your organization but never outside the organization?
answer
Packet redirect
question
What type of DNS server is authoritative for a specific domain? a. initial b. read-only c. secondary d. primary
answer
d. primary
question
The first phase of the system development life cycle is needs assessment.
answer
True
question
The people that manage security for the organization should not be same people that conduct risk analysis.
answer
False
question
What type of attack involves plaintext scripting that affects databases?
answer
SQL injection
question
A screened host has a router as part of the configuration.
answer
True
question
Which of the following is NOT a method used by passive sensors to monitor traffic?
answer
packet filters
question
Firewalls can protect against employees copying confidential data from within the network.
answer
False
question
What service uses UDP port 53?
answer
DNS
question
What makes IP spoofing possible for computers on the Internet?
answer
lack of authentication
question
Which of the following is true about a screening router?
answer
it should be combined with a firewall for better security
question
At what layer of the OSI model do proxy servers generally operate?
answer
Application
question
A dual-homed host has a single NIC with two MAC addresses.
answer
False
question
A screened host has a router as part of the configuration.
answer
True
question
Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.
answer
False
question
Proxy servers take action based only on IP header information.
answer
False
question
The TCP normalization feature forwards abnormal packets to an administrator for further inspection.
answer
False
question
Which of the following is true about a dual-homed host?
answer
serves as a single point of entry to the network
question
Which of the following best describes a DMZ?
answer
a subnet of publicly accessible servers placed outside the internal network
question
What do you call a firewall that is connected to the Internet, the internal network, and the DMZ?
answer
three-pronged firewall
question
Which of the following is best described as software that prioritizes and schedules requests and then distributes them to servers based on each server's current load and processing power.
answer
load-balancing software
question
In what type of attack are zombies usually put to use?
answer
DD0S
question
What should you consider installing if you want to inspect packets as they leave the network?
answer
reverse firewall
question
Which type of firewall configuration protects public servers by isolating them from the internal network?
answer
screened subnet DMZ
question
Which type of security device can speed up Web page retrieval and shield hosts on the internal network?
answer
proxy server
question
Which network device works at the Application layer by reconstructing packets and forwarding them to Web servers?
answer
proxy server
question
Which of the following is a disadvantage of using a proxy server?
answer
may require client configuration
question
What is a critical step you should take on the OS you choose for a bastion host?
answer
ensure all security patches are installed
question
What is a step you can take to harden a bastion host?
answer
remove unnecessary services
question
What is the term used for a computer placed on the network perimeter that is meant to attract attackers?
answer
honeypot
question
Why is a bastion host the system most likely to be attacked?
answer
it is available to external users
question
Which of the following is true about private IP addresses?
answer
they are not routable on the Internet
question
Which type of NAT is typically used on devices in the DMZ?
answer
one-to-one NAT
question
Which type of translation should you use if you need 50 computers in the corporate network to be able to access the Internet using a single public IP address?
answer
port address translation