問題一覧
1
During the recovery process, RTO and RPO should be the main parameters of your disaster recovery plan. What does RPO refer to?
The interval after which the data quality is lost
2
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?
System Specific Security Policy (SSSP)
3
Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?
Steven should enable Network Address Translation (NAT).
4
An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?
Location 3
5
Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions beyond the normal parameters?
Statistical anomaly detection
6
The GMT enterprise is working on their internet and web usage policies. GMT would like to control internet bandwidth consumption by employees. Which group of policies would this belong to?
Issue Specific Security Policy
7
Individuals in the organization using system resources in a way that violates acceptable usage policies indicates which of the following security incident(s):
Improper Usage
8
The Circuit-level gateway firewall technology functions at which of the following OSI layer?
Session layer
9
You are using Wireshark to monitor your network traffic and you see a lot of packages with the FIN, PUSH and URG flags activated; what can you infer about this behavior?
An attacker is running a XMAS scan against the network
10
Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes from the attacker to a target OS looking for the response to perform ICMP based fingerprinting?
(icmp.type==8 && ((!(icmp.code==8))
11
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.
Verification, Security policies
12
Your company is planning to use an uninterruptible power supply (UPS) to avoid damage from power fluctuations. As a network administrator, you need to suggest an appropriate UPS solution suitable for specific resources or conditions. Match the type of UPS with the use and advantage:
1-v,2-iii,3-i,4-ii
13
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, direwalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?
Bastion host.
14
As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's __________ integrity check mechanism provides security against a replay attack.
CBC-MAC
15
The SNMP contains various commands that reduce the burden on the network administrators. Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?
TRAPS
16
Daniel who works as a network administrator has just deployed an IDS in his organization's network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use, to calculate the False Positive rate?
False Positive/False Positive+True Negative
17
Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?
Prudent policy
18
Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.
Physical control
19
Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.
802.11b
20
An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?
inline mode
21
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?
Low severity level
22
You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?
Port Security
23
Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?
Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
24
Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?
Striping
25
Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?
Jamming signal attack
26
Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?
netstat -an
27
Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?
SATA
28
Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?
Data Integrity
29
Larry is a network administrator working for a manufacturing company in Detroit. Larry is responsible for the entire company's network which consists of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to cut back on costs and bring the email control internal. Larry likes this idea because it will give him more control over email. Larry wants to purchase a server for email but he does not want the server to be on the internal network because this might cause security risks. He decides to place the email server on the outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect some traffic from accessing the email server; the server will essentially be place between the two firewalls. What logical area is Larry going to place the new email server into?
He is going to place the server in a Demilitarized Zone (DMZ).
30
What is the correct order of activities that a IDS is supposed to attempt in order of detect an intrusion?
Prevention, Intrusion Monitoring, intrusion Detection, Response
31
Match the following NIST security life cycle components with their activities:
1-iv, 2- iii,3-v,4-i
32
Which of the following can be used to suppress fire from Class K sources?
Foam
33
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?
Fred's boss wants a NIDS implementation
34
Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?
Discretionary access control
35
A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.
PCI DSS
36
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
37
The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.
ICMP
38
Which of the following is a best practice for wireless network security?
Using SSID cloaking
39
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
Hub-and-Spoke
40
Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?
Lyle would be best suited if he chose a NIPS implementation.
41
Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?
Context-based signature analysis
42
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?
Circuit level gateway
43
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)
Reliability, Capability, Extensibility
44
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?
They work on the network layer.
45
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
Pipe model
46
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?
Edit the PAM file to enforce Windows Authentication.
47
The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network. Which CND approach is being used?
Retrospective
48
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?
Dictionary
49
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?
Cindy is using a half-open scan to find live hosts on her network.
50
You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?
A NIDS device would work best for the company.
51
Which of the following is a computer network protocol used by the hosts to apply for the tasks the IP address and other configuration information?
DHCP
52
Which of the following is a compatible network device that converts various communication protocols and are used to connect different network technologies?
Router
53
Adam, malicious hacker, has just succeeded in stealing through a secure cookie XSS attack. He is able to play back the cookie even if the session is valid on the server. Which of the following is the most likely cause of this issue?
Encryption is performed at the application level (one encryption key).
54
Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?
ARP
55
Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.
Keep routers updated with the latest security updates., Configure access list entries to prevent unauthorized connections and routing., Use a complex password of the router management console.
56
Which of the following types of coaxial cable used for cable television and cable modems?
RG-59
57
Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
It uses a longer subnet masks as those used for IPv4., It uses 128-bit addresses., It's more of available IP addresses.
58
Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?
WASC
59
Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?
User EXEC
60
You are using more than the safety of the existing network. You'll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?
Honey Pot
61
Which of the following is a kind of security, which deals with the protection of false signals transmitted by the electrical system?
emanation Safety
62
Which of the following routing metrics refers to the time required to transfer the package to the source via the Internet?
Routing delay
63
The attacks are classified as which of the following? Each correct answer represents a complete solution. Choose all that apply.
replay attack, active attack, passive attack, session hijacking
64
Which of the following offer "always-on" Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.
DSL, Cable modem
65
Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?
Birthday attack