Security In Network Design

This question bank verified by Studydeets
All Questions
Filter by:
Question 1
Free
True/False

 Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Choose correct answer/s

True

False

Check answer
Question 2
Free
True/False

 A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

Choose correct answer/s

True

False

Check answer
Question 3
Free
True/False

 The Spanning Tree Protocol operates at the Network layer of the OSI model.

Choose correct answer/s

True

False

Check answer
Question 4
Free
True/False

 The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.

Choose correct answer/s

True

False

Check answer
Question 5
Free
True/False

 By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.

Choose correct answer/s

True

False

Check answer
Question 6
True/False

 When utilizing Kerberos, an access granting ticket is the same as a key.

Choose correct answer/s
True
False
To unlock the question
Question 7
True/False

 The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.

Choose correct answer/s
True
False
To unlock the question
Question 8
True/False

 The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.

Choose correct answer/s
True
False
To unlock the question
Question 9
Multiple Choice

 Which of the following is an example of proxy server software?

Choose correct answer/s
A
Squid
B
BIND
C
Snort
D
Apache
To unlock the question
Question 10
Multiple Choice

 What is NOT a variable that an network access control list can filter traffic with?

Choose correct answer/s
A
The Network layer protocol used for the packet.
B
The Transport layer protocol used for the packet.
C
The source or destination TCP/UDP port number in the packet.
D
The operating system used by the source or destination device.
To unlock the question
Question 11
Multiple Choice

 In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

Choose correct answer/s
A
0.0.0.0
B
255.255.255.255
C
255.255.0.0
D
0.0.255.255
To unlock the question
Question 12
Multiple Choice

 What kind of firewall can block designated types of traffic based on application data contained within packets?

Choose correct answer/s
A
stateful firewall
B
stateless firewall
C
content-filtering firewall
D
packet-filtering firewall
To unlock the question
Question 13
Multiple Choice

 On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

Choose correct answer/s
A
ipf
B
modfire
C
iptables
D
netwall
To unlock the question
Question 14
Multiple Choice

 What is a SIEM (Security Information and Event Management) system utilized for?

Choose correct answer/s
A
It is an advanced intrusion protection system with a GUI-frontend.
B
It is a system used to evaluate data from security devices and generate alerts.
C
It is an intellectual property protection software that prevents data links, and generates alerts.
D
It is a system that monitors security device hardware availability.
To unlock the question
Question 15
Multiple Choice

 When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

Choose correct answer/s
A
STP must first select the root bridge, or master bridge.
B
STP examines the possible paths between all other bridges.
C
STP disables links that are not part of a shortest path.
D
STP begins to block BPDUs on non-designated ports.
To unlock the question
Question 16
Multiple Choice

 In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

Choose correct answer/s
A
BPDU filter
B
BPDU guard
C
root guard
D
BPDU drop
To unlock the question
Question 17
Multiple Choice

 Which protocol designed to replace STP operates at Layer 3 of the OSI model?

Choose correct answer/s
A
Rapid Spanning Tree Protocol (RSTP)
B
Transparent Interconnection of Lots of Links (TRILL)
C
Shortest Path Bridging (SPB)
D
Multiple Spanning Tree Protocol (MSTP)
To unlock the question
Question 18
Multiple Choice

 You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

Choose correct answer/s
A
set max-mac
B
set total-macs
C
mac-address limit
D
mac-limit
To unlock the question
Question 19
Multiple Choice

 Enforcing a virtual security perimeter using a client's geographic location is known by what term?

Choose correct answer/s
A
geohashing
B
geofencing
C
geolocating
D
geolocking
To unlock the question
Question 20
Multiple Choice

 When using Kerberos, what is the purpose of a ticket?

Choose correct answer/s
A
It is the name for a Kerberos client or user.
B
It is a key used by the client to gain access to services that are protected by the key on the network.
C
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
D
It is the event that is generated when auditing a resource and unauthorized access is attempted.
To unlock the question