Network pro Exam Marking Scheme Current Update
Which of the following BEST describes an inside attacker? - Answer -An unintentional threat actor (the most common threat).
Which of the following is an example of an internal threat? - Answer -A user accidentally deletes the new product designs....
Network pro Exam Marking Scheme
Current Update
Which of the following BEST describes an inside attacker? - Answer -An unintentional
threat actor (the most common threat).
Which of the following is an example of an internal threat? - Answer -A user accidentally
deletes the new product designs.
Telnet is inherently unsecure because its communication is in plaintext and is easily
intercepted. Which of the following is an acceptable alternative to Telnet? - Answer -
SSH
Which of the following protocols can you use to securely manage a network device from
a remote connection? - Answer -SSH
Which protocol does HTTPS use to offer greater security for web transactions? -
Answer -SSL
You want to allow traveling users to connect to your private network through the
internet. Users will connect from various locations, including airports, hotels, and public
access points (like coffee shops and libraries). As such, you won't be able to configure
the firewalls that might be controlling access to the internet in these locations.
Which of the following protocols is MOST likely to be allowed through the widest
number of firewalls? - Answer -SSL
Which of the following protocols are often added to other protocols to provide secure
data transmission? (Select two.) - Answer -TLS
SSL
Which of the following intrusion detection and prevention systems uses fake resources
to entice intruders by displaying a vulnerability, configuration flaw, or valuable data? -
Answer -Honeypot
Creating fake resources such as honeypots, honeynets, and tarpits fulfills which of the
following main intrusion detection and prevention goals? (Select two.) - Answer -
Reveals information about an attacker's methods and gathers evidence for identification
or prosecution purposes.
Offers attackers a target that occupies their time and attention while distracting them
from valid resources.
,Members of the sales team use laptops to connect to the company network. While
traveling, they connect their laptops to the internet through airport and hotel networks.
You are concerned that these computers will pick up viruses that could spread to your
private network. You would like to implement a solution that prevents the laptops from
connecting to your network unless antivirus software and the latest operating system
patches have been installed.
Which solution should you use? - Answer -NAC
A network utilizes a network access control (NAC) solution to defend against malware.
When a wired or wireless host tries to connect to the network, a NAC agent on the host
checks it to make sure it has all of the latest operating system updates installed and that
the latest antivirus definitions have been applied.
What is this process called? - Answer -Posture assessment
When analyzing assets, which analysis method assigns financial values to assets? -
Answer -Quantitative
What is the main difference between vulnerability scanning and penetration testing? -
Answer -Vulnerability scanning is performed within the security perimeter; penetration
testing is performed outside of the security perimeter.
A security administrator is conducting a penetration test on a network. She connects a
notebook system running Linux to the wireless network and then uses Nmap to probe
various network hosts to see which operating system they are running.
Which process did the administrator use for the penetration test in this scenario? -
Answer -Active fingerprinting
Drag each penetration test characteristic on the left to the appropriate penetration test
name on the right. - Answer -Known test - The tester has detailed information about the
target system prior to starting the test.
Partially known test - The tester has the same amount of information that would be
available to a typical insider in the organization.
Unknown test - The tester has no prior knowledge of the target system.
Single-blind test - Either the attacker has prior knowledge about the target system or the
administrator knows that the test is being performed.
Double-blind test - The tester does not have prior information about the system, and the
administrator has no knowledge that the test is being performed.
,Which SIEM component is responsible for gathering all event logs from configured
devices and securely sending them to the SIEM system? - Answer -Collectors
Which of the following Security Orchestration, Automation, and Response (SOAR)
system components helps to document the processes and procedures that are to be
used by a human during a manual intervention? - Answer -Playbook
You want to make sure that a set of servers only accepts traffic for specific network
services. You have verified that the servers are only running the necessary services, but
you also want to make sure that the servers do not accept packets sent to those
services.
Which tool should you use? - Answer -Port scanner
A security administrator logs on to a Windows server on her organization's network.
Then she runs a vulnerability scan on that server.
Which type of scan did she conduct in this scenario? - Answer -Credentialed scan
You want to be able to identify the services running on a set of servers on your network.
Which tool would BEST give you the information you need? - Answer -Vulnerability
scanner
Based on a review of physical security at your office, you have recommended several
improvements. Your plan includes installing smart card readers, IP cameras, signs, and
an access logbook.
In this lab, your task is to:
Implement your physical security plan by dragging the correct items from the shelf onto
the various locations in the building. As you drag the items from the shelf, the possible
drop locations are highlighted. To implement your plan, you must: - Answer -Install the
IP security cameras:
From the Shelf, expand CCTV Cameras.
Drag an IP Security Camera from the shelf to the highlighted circle inside the
networking closet.
Drag an IP Security Camera from the shelf to the highlighted circle just outside the
networking closet.
Install the smart card key readers:
From the Shelf, expand Door Locks.
Drag a smart card reader from the shelf to the highlighted location outside the building's
front door.
Drag a smart card reader from the shelf to the highlighted location outside the
networking closet's door.
Install the Restricted Access sign:
From the Shelf, expand Restricted Access Signs.
Drag the Restricted Access sign from the shelf to the networking closet door.
, Install the visitor log:
From the Shelf, expand Visitor Logs.
Drag the visitor log from the shelf to the lobby desk.
Five salespeople work out of your office. They frequently leave their laptops on the
desks in their cubicles. You are concerned that someone might walk by and take one of
these laptops.
Which of the following is the BEST way to address your concerns? - Answer -Use cable
locks to chain the laptops to the desks.
What is the primary benefit of CCTV? - Answer -Expands the area visible to security
guards.
Which of the following CCTV types would you use in areas with little or no light? -
Answer -Infrared
Match each physical security control on the left with an appropriate example of that
control on the right. Each security control may be used once, more than once, or not at
all. - Answer -Hardened carrier - Protected cable distribution
Biometric authentication - Door locks
Barricades - Perimeter barrier
Emergency escape plans- Safety
Alarmed carrier - Protected cable distribution
Anti-passback system - Physical access control
Emergency lighting - Safety
Exterior floodlights - Perimeter barrier
You want to use CCTV as a preventative security measure. Which of the following is a
requirement for your plan? - Answer -Security guards
Which of the following is the MOST important way to prevent console access to a
network switch? - Answer -Keep the switch in a room that is locked by a keypad.
Which of the following controls is an example of a physical access control method? -
Answer -Locks on doors
Which of the following can you use to stop piggybacking from occurring at a front
entrance where employees swipe smart cards to gain entry? - Answer -Deploy a
mantrap.
You are an IT consultant and are visiting a new client's site to become familiar with their
network. As you walk around their facility, you note the following: - Answer -Control
access to the work area with locking doors and card readers.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Stuviaascorers. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.19. You're not tied to anything after your purchase.