CompTIA Security+ Chapter Four Review


Published on

This is a ppt I created to inspire my students to competively answer and relearn for the test on Chapter Four: Securing your Network in the CompTIA Security+ Get Certified Get Ahead SY0-301 Study Guide

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

CompTIA Security+ Chapter Four Review

  1. 1. Chapter 4 Review McKinley Technology High School – Ms. Wiscount
  2. 2. What can an administrator use to detect malicious activity after it occurred? • Firewall • Sniffer • Port scanner • IDS
  3. 3. Of the following choices, what would detect compromises on a local server? • HIDS • NIPS • Firewall • Protocol Analyzer
  4. 4. Of the following choices, what represents the best choice for a system to detect attacks on a network, but not block them? • NIDS • NIPS • HIDS • HIPS
  5. 5. Your organization is using a NIDS. The NIDS vendor regularly provides updates for the NIDS to detect known attacks. What type of NIDS is this? • Anomaly-based • Signature-based • Prevention-based • Honey-based
  6. 6. You are preparing to deploy an anomaly-based detection system to monitor network activity. What would you create first? • Flood guards • Signatures • Baseline • Honeypot
  7. 7. Of the following choices, what can you use to divert malicious attacks on your networks away from valuable resources to relatively worthless resources? • IDS • Proxy server • Web application firewall • Honeypot
  8. 8. Of the following choices, what best describes the function of an IPS? • Detect attacks • Stop attacks in progress • Prevent attackers from attacking • Notify appropriate personnel of attacks
  9. 9. Of the following choices, what provides active protection for an operating system? • NIDS • NIPS • HIDS • HIPS
  10. 10. Of the following choices, what most accurately describes a NIPS? • Detects and takes action against threats • Provides notification of threats • Detects and eliminates threats • Identifies zero day vulnerabilities
  11. 11. You’ve recently completed a wireless audit and realize that the wireless signal from your company’s WAP reaches the parking lot. What can you do to ensures that the signal doesn’t reach outside your building? • Increase the WAP’s power level • Decrease the WAP’s power level • Enable SSID broadcasting • Disable SSID broadcasting
  12. 12. Which of the following secure protocols did WEP implement incorrectly, allowing attackers to crack it? • SSL • RC4 • CCMP • AES
  13. 13. Your organization is designing an 802.11n network and wants to use the strongest security. What would you recommend? • FTPS • SSL • WEP • WPA2
  14. 14. Which of the following authentication mechanisms can provide centralized authentication for a wireless network? • WPA2 • RADIUS • Multifactor authentication • Kerberos
  15. 15. You want to ensure that only specific wireless clients can access your wireless networks. Of the following choices, what provides the best solution? • MAC filtering • Content filtering • NAT • NIPS
  16. 16. You recently completed a wireless audit of your company’s wireless network. You’ve identified several unknown devices connected to the network and realize they are devices owned by company employees. What can you use to prevent these devices from connecting? • MAC filtering • Enable SSID broadcast • Enable isolation mode on the WAP • Reduce the power levels on the WAP
  17. 17. What can you do to prevent the easy discovery of a WAP? • Enable MAC filtering • Disable SSID broadcast • Enable SSID broadcast • Enable 802.1X authentication
  18. 18. What troubleshooting a problem with a WAP in your organization, you discover a rogue access point with the same SSID as the organization’s WAP. What is the second access point? • IDS • War chalking • Evil twin • Packet sniffer
  19. 19. You want to identify the physical location of a rogue access point you discovered in the footprint of your company. What would you use? • Bluesnarfing • Bluejacking • War chalking • War driving
  20. 20. You are hosting a wireless hotspot, and you want to segment wireless users from each other. What should you use? • Personal mode • Enterprise mode • Isolation mode • WEP
  21. 21. Which of the following best describes bluejacking? • Bluejacking involves accessing data on a phone • Bluejacking involves checking a WAP’s antenna placement, power levels and encryption techniques • Bluejacking involves sending unsolicited messages to a phone • Bluejacking involves a rogue access point with the same SSID as your production WAP
  22. 22. Someone stole an executive’s smartphone, and the phone includes sensitive data. What should you do to prevent the thief from reading the data? • Password protect the phone • Encrypt the data on the phone • Use remote wipe • Track the location of the phone
  23. 23. You are deploying a remote access server for your organization. Employees will use this to access the network while on the road. Of the following choices, what must you configure? • NAC • ACLs • MACs • NAT-T
  24. 24. Your organization is creating a site-to-site VPN tunnel between the main business location and a remote office. What can it use to create the tunnel? • WAP2-Enterprise • RADIUS • NAC • IPsec
  25. 25. You are planning to deploy a VPN with IPsec. Users will use the VPN to access corporate resources while they are on the road. How should you use IPsec? • With AH in tunnel mode • With AH in transport mode • With ESP in tunnel mode • With ESP in transport mode
  26. 26. An employee connect to the corporate network using a VPN. However, the client is not able to access internal resources, but instead receives a warning indicating their system is not up to date with current patches. What is causing the behavior? • The VPN is using IPsec • The VPN is not using IPsec • NAC is disabled on the network and remediation must take place before the client can access internal resources • NAC is enabled on the network and remdeiation must take place before the client can access internal resources
  27. 27. In order to provide flexible working conditions, a company has decided to allow some employees remote access into corporate headquarters. Which of the following security technologies could be used to provide remote access? (Select TWO). • Subnetting • NAT • Firewall • NAC • VPN
  28. 28. Which of the following can prevent an unauthorized person from accessing the network by plugging into an open network jack? • 802.1X • DHCP • 802.1q • NIPS
  29. 29. A targeted email attack sent to Sara, the company’s Chief Executive Officer (CEO), is known as which of the following? • Whaling • Bluesnarfing • Vishing • Dumpster diving
  30. 30. Which of the following specifications would Sara, an administrator, implement as a network access control? • 802.1q • 802.3 • . 802.11n • 802.1x
  31. 31. Configuring the mode, encryption methods, and security associations are part of which of the following? • IPSec • Full disk encryption • 802.1x • PKI
  32. 32. Which of the following would an antivirus company use to efficiently capture and analyze new and unknown malicious attacks? • Fuzzer • IDS • Proxy • Honeypot
  33. 33. Which of the following provides the HIGHEST level of confidentiality on a wireless network? • Disabling SSID broadcast • MAC filtering • WPA2 • Packet switching
  34. 34. Matt, an IT administrator, wants to protect a newly built server from zero day attacks. Which of the following would provide the BEST level of protection? • HIPS • Antivirus • NIDS • ACL
  35. 35. Mike, a network administrator, has been asked to passively monitor network traffic to the company’s sales websites. Which of the following would be BEST suited for this task? • HIDS • Firewall • NIPS • Spam filter
  36. 36. Mike, a security professional, is tasked with actively verifying the strength of the security controls on a company’s live modem pool. Which of the following activities is MOST appropriate? • War dialing • War chalking • War driving • Bluesnarfing
  37. 37. Jane, a security administrator, has observed repeated attempts to break into a server. Which of the following is designed to stop an intrusion on a specific server? • HIPS • NIDS • HIDS • NIPS
  38. 38. Which of the following devices can Sara, an administrator, implement to detect and stop known attacks? • Signature-based NIDS • Anomaly-based NIDS • Signature-based NIPS • Anomaly-based NIPS
  39. 39. While setting up a secure wireless corporate network, which of the following should Pete, an administrator, avoid implementing? • EAP-TLS • PEAP • WEP • WPA
  40. 40. Which of the following are used to implement VPNs? (Select TWO). • SFTP • IPSec • HTTPS • SNMP • SSL
  41. 41. Which of the following describes how Sara, an attacker, can send unwanted advertisements to a mobile device? • Man-in-the-middle • Bluejacking • Bluesnarfing • Packet sniffing
  42. 42. Which of the following protocols can be used to secure traffic for telecommuters? • WPA • IPSec • ICMP • SMTP
  43. 43. Which of the following allows Pete, a security technician, to provide the MOST secure wireless implementation? • Implement WPA • Disable SSID • Adjust antenna placement • Implement WEP
  44. 44. Which of the following technologies would allow for a secure tunneled connection from one site to another? (Select TWO). • SFTP • IPSec • SSH • HTTPS • ICMP
  45. 45. Which of the following network design elements provides for a one-to-one relationship between an internal network address and an external network address? • NAT • NAC • VLAN • PAT
  46. 46. Which of the following is true concerning WEP security? • WEP keys are transmitted in plain text. • The WEP key initialization process is flawed. • The pre-shared WEP keys can be cracked with rainbow tables. • WEP uses the weak RC4 cipher.
  47. 47. Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses to gather data on new malware. Which of the following is being implemented by Jane’s company? • Vulnerability scanner • Honeynet • Protocol analyzer • Port scanner
  48. 48. The information security department regularly walks the campus and around the buildings looking for unauthorized open wireless networks. This is an example of which of the following? • A site survey • Antenna placement • War dialing • War driving
  49. 49. Matt must come up with a design solution which will enable remote users to securely access network resources. Which of the following design elements will enable Matt to meet this objective? • DMZ • VLAN • VPN • NAT
  50. 50. Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address? • Interference • Man-in-the-middle • Evil twin • Rogue access point
  51. 51. Matt, the security administrator, wants to secure the wireless network. Which of the following encryption methods offers the MOST security? • WPA2 ENT AES • WPA2 PSK AES • WPA2 ENT TKIP • WPA2 PSK TKIP
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.