124. A. (Choose two.). Therefore the correct answer is D. 26) In Wi-Fi Security, which of the following protocol is more used? It is usually accomplished by disturbing the service temporarily or indefinitely of the target connected to the internet. DH (Diffie-Hellman) is an algorithm used for key exchange. C. Reaction Prevent sensitive information from being lost or stolen. WebFEDVTE Foundations of Incident Management Questions and Answers Graded A+ Political motivations and financial interests are the two most common motivations behind current cyber threats. (Choose two.). the network name where the AAA server resides, the sequence of servers in the AAA server group. Explanation: The SIPRNET (or Advanced Research Project Agency Network) system was first hacked by Kevin Poulsen as he breaks into the Pentagon network. ____________ authentication requires the identities of both parties involved in a communication session to be verified. How should a room that is going to house your servers be equipped? 108. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner. RADIUS provides secure communication using TCP port 49. separates the authentication and authorization processes. Secure access to 28. The username and password would be easily captured if the data transmission is intercepted. The dhcpd auto-config outside command was issued to enable the DHCP server. Which type of firewall is the most common and allows or blocks traffic based on Layer 3, Layer 4, and Layer 5 information? HMAC can be used for ensuring origin authentication. The idea is that passwords will have been changed before an attacker exhausts the keyspace. Developed by JavaTpoint. Use the none keyword when configuring the authentication method list. Which protocol would be best to use to securely access the network devices? FTP and HTTP do not provide remote device access for configuration purposes. Network Security (Version 1) Network Security 1.0 Final Exam, Explanation: Malware can be classified as follows:Virus (self-replicates by attaching to another program or file)Worm (replicates independently of another program)Trojan horse (masquerades as a legitimate file or program)Rootkit (gains privileged access to a machine while concealing itself)Spyware (collects information from a target system)Adware (delivers advertisements with or without consent)Bot (waits for commands from the hacker)Ransomware (holds a computer system or data captive until payment isreceived). A researcher is comparing the differences between a stateless firewall and a proxy firewall. Many students dont drink at all in college Transformed text Explanation: On the basis of response time and transit time, the performance of a network is measured. "Web security" also refers to the steps you take to protect your own website. During the second phase IKE negotiates security associations between the peers. hostname R2. How to find: Press Ctrl + F in the browser and fill in whatever wording is in the question to find that question/answer. It includes coverage of advance exploits by using the research work of the Cisco Talos security experts. What is true about VPN in Network security methods? installing the maximum amount of memory possible. Antivirus and antimalware software protect an organization from a range of malicious software, including viruses, ransomware, worms and trojans. Explanation: In general, Stalking refers to continuous surveillance on the target (or person) done by a group of people or by the individual person. WebI. 118. Letters of the message are rearranged randomly. Explanation: With most modern algorithms, successful decryption requires knowledge of the appropriate cryptographic keys. A recently created ACL is not working as expected. Which type of attack is mitigated by using this configuration? Many students want to drink in safer ways (Choose two.). Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file? Explanation: Many companies now support employees and visitors attaching and using wireless devices that connect to and use the corporate wireless network. This mode is referred to as a bump in the wire. NAT can be implemented between connected networks. How the network resources are to be used should be clearly defined in a (an) ____________ policy. When just a few minutes of downtime can cause widespread disruption and massive damage to an organization's bottom line and reputation, it is essential that these protection measures are in place. If a public key is used to encrypt the data, a private key must be used to decrypt the data. Explanation: Trojans are a type of malware that will perform any types of actions for those they are design or programmed. A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users. Cybercriminals are increasingly targeting mobile devices and apps. 29. Remote control is to thin clients as remote access is to? 88. What are two differences between stateful and packet filtering firewalls? Network access control (NAC) can be set at the most granular level. B. The last five bits of a supplied IP address will be ignored. Refer to the exhibit. D. All of the above, Which of the following statements is true based on recent research: (Choose two. What are two reasons to enable OSPF routing protocol authentication on a network? Which statement describes the effect of the keyword single-connection in the configuration? What are two additional uses of ACLs? An intrusion prevention system (IPS) scans network traffic to actively block attacks. The neighbor advertisements from the ISP router are implicitly permitted by the implicit permit icmp any any nd-na statement at the end of all IPv6 ACLs. What type of policy defines the methods involved when a user sign in to the network? OSPF authentication does not provide faster network convergence, more efficient routing, or encryption of data traffic. List the four characteristics. The goal is to The four 1s represented by the decimal value of 15 represents the four bits to ignore. What could be used by the network administrator to provide a secure authentication access method without locking a user out of a device? A. Phishing is one of the most common ways attackers gain access to a network. D. All of the above. 139. (In other words, what feature is common to one of the these but not both?). Explanation: The IPsec framework consists of five building blocks. Match the network monitoring technology with the description. Traffic from the Internet can access both the DMZ and the LAN. 9) Read the following statement carefully and find out whether it is correct about the hacking or not? 5) _______ is a type of software designed to help the user's computer detect viruses and avoid them. It is the traditional firewall deployment mode. 104. Explanation: Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information.An application gateway firewall (proxy firewall), as shown in the figure, filters information at Layers 3, 4, 5, and 7 of the OSI reference model. Which command should be used on the uplink interface that connects to a router? These security levels allow traffic from more secure interfaces, such as security level 100, to access less secure interfaces, such as level 0. HMAC uses a secret key as input to the hash function, adding authentication to integrity assurance. )if(typeof ez_ad_units!='undefined'){ez_ad_units.push([[300,250],'itexamanswers_net-medrectangle-3','ezslot_10',167,'0','0'])};__ez_fad_position('div-gpt-ad-itexamanswers_net-medrectangle-3-0'); 2. Decrease the wireless antenna gain level. Match the IPS alarm type to the description. B. Layer 2 address contains a network number. An advantage of an IDS is that by working offline using mirrored traffic, it has no impact on traffic flow. SIEM is used to provide real-time reporting of security events on the network. This traffic is permitted with little or no restriction. Explanation: A digital certificate might need to be revoked if its key is compromised or it is no longer needed. For example, Forcepoint's Next Generation Firewall (NGFW) offers seamless and centrally managed control of network traffic, whether it is physical, virtual or in the cloud. Explanation: Email is a top attack vector for security breaches. 152. 115. Which pair ofcrypto isakmp keycommands would correctly configure PSK on the two routers? What is the next step? Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Explanation: Data integrity guarantees that the message was not altered in transit. A user complains about being locked out of a device after too many unsuccessful AAA login attempts. 126. When a computer sends data over the Internet, the data is grouped into a single packet. Which two steps are required before SSH can be enabled on a Cisco router? Therefore the correct answer is D. 23) Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? (Choose all that apply.). (Choose two. What characteristic of the Snort term-based subscriptions is true for both the community and the subscriber rule sets? As shown in the figure below, a security trap is similar to an air lock. They use a pair of a public key and a private key. Hacktivists use their hacking as a form of political or social protest, and vulnerability brokers hack to uncover weaknesses and report them to vendors. 7. In Short, these three principles are also known as the CIA triad and plays a vital role as the cornerstone of the security structure of any organization. C. Limiting drinking to one or fewer drinks per hour A. Authentication Port security gives an administrator the ability to manually specify what MAC addresses should be seen on given switch ports. D. Fingerprint. Protecting vulnerabilities before they are compromised. After the person is inside the security trap, facial recognition, fingerprints, or other biometric verifications are used to open the second door. 12) Which one of the following refers to the technique used for verifying the integrity of the message? WebYou learn that all of the following are true about TCP/IP EXCEPT: It defines how messages are routed from one end of a network to the other. 34) Which one of the following principles of cyber security refers that the security mechanism must be as small and simple as possible? The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks? Explanation: Telnet sends passwords and other information in clear text, while SSH encrypts its data. Next step for sql_inst_mr: Use the following information to resolve the error, uninstall this feature, and then run the setup process again. We truly value your contribution to the website. 32) When was the first computer virus created? (Choose two.). Thebest antimalware programsnot only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage. Create a banner that will be displayed to users when they connect. Which statement is a feature of HMAC? D. Denying by default, allowing by exception. What functionality is provided by Cisco SPAN in a switched network? 3. In addition to protecting assets and the integrity of data from external exploits, network security can also manage network traffic more efficiently, enhance network performance and ensure secure data sharing between employees and data sources. Explanation: The vulnerability, port, and network scanning are three types of scanning. Refer to the exhibit. Production traffic shares the network with management traffic. A security analyst is configuring Snort IPS. R1(config-if)# ppp pap sent-username R1 password 5tayout!R2(config-if)# ppp pap sent-username R2 password 5tayout! 132. Mail us on [emailprotected], to get more information about given services. A. Devices within that network, such as terminal servers, have direct console access for management purposes. This means that the security of encryption lies in the secrecy of the keys, not the algorithm. Which protocol is an IETF standard that defines the PKI digital certificate format? Explanation: It is generally defined as the software designed to enter the target's device or computer system, gather all information, observe all user activities, and send this information to a third party. (Choose two.). Several factors can cause tire failure including under inflation, hard braking, and __________. Explanation: The term "CHAP" stands for the Challenge Handshake Authentication Protocols. For every inbound ACL placed on an interface, there should be a matching outbound ACL. Only a root user can add or remove commands. What network testing tool is used for password auditing and recovery? (Choose two.). ), 36. 127. 125. The best software not only scans files upon entry to the network but continuously scans and tracks files. It is usually based on the IPsec ( IP Security) or SSL (Secure Sockets Layer) C. It typically creates a secure, encrypted virtual tunnel over the open 2) Which one of the following can be considered as the class of computer threats? Which measure can a security analyst take to perform effective security monitoring against network traffic encrypted by SSL technology? 37) Which of the following can also consider as the instances of Open Design? Explanation: Confidentiality, Integrity, Availability are the three main principles. Explanation: Using an intrusion prevention system (IPS) and firewall can limit the information that can be discovered with a port scanner. Set up an authentication server to handle incoming connection requests. This Information and Network 35. Give the router a host name and domain name. to provide data security through encryption, authenticating and encrypting data sent over the network, retaining captured messages on the router when a router is rebooted. IPsec: The following true/false questions pertain to the figure below on security associations (SA) from R1 to R2 Evaluate if it is true or false, and explain why. The dhcpd enable inside command was issued to enable the DHCP client. 520/- only. A. UserID 46. 18. How does a firewall handle traffic when it is originating from the public network and traveling to the DMZ network? 21. There are many layers to consider when addressing network security across an organization. command whereas a router uses the help command to receive help on a brief description and the syntax of a command. Would love your thoughts, please comment. ***Rooms should have locks, adequate power receptacles, adequate cooling measures, and an EMI-free environment. B. B. HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks. Which two options can limit the information discovered from port scanning? ***If a person has physical access to a device, access to data isn't far behind, Which of the following is a credential category used in multifactor authentication? Email security tools can block both incoming attacks and outbound messages with sensitive data. PC1 has a different MAC address and when attached will cause the port to shut down (the default action), a log message to be automatically created, and the violation counter to increment. (Choose three.). Which of the following is true regarding a Layer 2 address and Layer 3 address? (Choose two.). PKI certificates are public information and are used to provide authenticity, confidentiality, integrity, and nonrepudiation services that can scale to large requirements. Which of the following are objectives of Malware? D. Access control. It is commonly implemented over dialup and cable modem networks. 134. Snort uses rules and signatures to generate alerts. Which type of packet is unable to be filtered by an outbound ACL? Which two options are security best practices that help mitigate BYOD risks? Next step for AdvancedAnalytics: Use the following information to resolve the error, uninstall this feature, and then run the setup process again. Now let's take a look at some of the different ways you can secure your network. This subscription is fully supported by Cisco. Explanation: The example given in the above question refers to the least privileges principle of cyber security. However, the CIA triad does not involve Authenticity. A volatile storage device is faster in reading and writing data.D. Being deployed in inline mode, an IPS can negatively impact the traffic flow. 38) Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it? Excellent communication skills while being a true techie at heart. It is computer memory that requires power to maintain the stored information. Deleting a superview does not delete the associated CLI views. JavaTpoint offers too many high quality services. 45. What function is performed by the class maps configuration object in the Cisco modular policy framework? Frames from PC1 will be forwarded since the switchport port-security violation command is missing. Explanation: Reaper is considered as the world's first antivirus program or software as it can detect the copies of a Creeper (the world's first man-made computer virus) and could delete it as well. 55) In order to ensure the security of the data/ information, we need to ____________ the data: Explanation: Data encryption is a type of method in which the plain text is converted into ciphertext, and only the authorized users can decrypt it back to plain text by using the right key. UserID can be a combination of username, user student number etc. Frames from PC1 will be dropped, and a log message will be created. It copies the traffic patterns and analyzes them offline, thus it cannot stop the attack immediately and it relies on another device to take further actions once it detects an attack. Harden network devices. When a superview is deleted, the associated CLI views are deleted., Only a superview user can configure a new view and add or remove commands from the existing views.. 102. 14) Which of the following port and IP address scanner famous among the users? 111. Remove the inbound association of the ACL on the interface and reapply it outbound. A stateful firewall provides more stringent control over security than a packet filtering firewall. Malware is short form of ? 34. R1(config)# crypto isakmp key 5tayout! Explanation: RADIUS is an open-standard AAA protocol using UDP port 1645 or 1812 for authentication and UDP port 1646 or 1813 for accounting. No, in any situation, hacking cannot be legal, It may be possible that in some cases, it can be referred to as a legal task, Network, vulnerability, and port scanning, To log, monitor each and every user's stroke, To gain access the sensitive information like user's Id and Passwords, To corrupt the user's data stored in the computer system, Transmission Contribution protocol/ internet protocol, Transmission Control Protocol/ internet protocol, Transaction Control protocol/ internet protocol. The first 28 bits of a supplied IP address will be matched. It requires using a VPN client on the host PC. Traffic from the Internet and DMZ can access the LAN. 105. 117. (Choose three. D. All of the above, Which choice is a unit of speed? Which two technologies provide enterprise-managed VPN solutions? Controlled access, such as locks, biometric authentication and other devices, is essential in any organization. A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Ideally, the classifications are based on endpoint identity, not mere IP addresses. Only allow devices that have been approved by the corporate IT team. ), In an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. It prevents traffic on a LAN from being disrupted by a broadcast storm. 150. 116. A corporate network is using NTP to synchronize the time across devices. A corresponding policy must be applied to allow return traffic to be permitted through the firewall in the opposite direction. Data between the two points is encrypted and the user would need to authenticate to allow communication between their device and the network. This section focuses on "Network Security" in Cyber Security. Each building block performs a specific securty function via specific protocols. What is the main factor that ensures the security of encryption of modern algorithms? 110. Virtual private networks (VPNs) create a connection to the network from another endpoint or site. A user account enables a user to sign in to a network or computer. What is the next step? Get total 22 General Awareness multiple choice questions & answers EBooks worth Rs. Match each SNMP operation to the corresponding description. So the correct answer will be A. Use the login local command for authenticating user access. It is a type of device that helps to ensure that communication between a Reimagine the firewall with Cisco SecureX (video 1:55), Explore VPN and endpoint security clients, Cisco Aironet AP Module for Wireless Security. Explanation: The term "TCP/IP" stood for Transmission Control Protocol/ internet protocol and was developed by the US government in the early days of the internet. B. true positive true negative false positive false negativeverified attack traffic is generating an alarmnormal user traffic is not generating an alarmattack traffic is not generating an alarmnormal user traffic is generating an alarm. Explanation: The Cisco IOS ACLs are configured with a wildcard mask and the Cisco ASA ACLs are configured with a subnet mask. C. Steal sensitive data. Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. The TACACS+ server only accepts one successful try for a user to authenticate with it. A statefull firewall will examine each packet individually while a packet filtering firewall observes the state of a connection. Which statement describes a difference between the Cisco ASA IOS CLI feature and the router IOS CLI feature? What action should the administrator take first in terms of the security policy? Which of the following are common security objectives? Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim? documents used in encryption and authentication protocols that identify a person or computer and can be verified by a certification authority, spreads by replicating itself into programs or documents, monopolizes network services or network bandwidth, inspects packets as they go into and out of the network, a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity, malware that's activated when a particular event occurs, a self-contained, self-replicating program, packets are denied on context as well as packet properties, permits access to computer, bypasses normal authentication. Inside command was issued to enable the DHCP server stateful and packet filtering firewall observes the state of device. + F in the AAA server group of encryption lies in the secrecy the. Secure your network analyst take to protect your own website testing tool is used to the., hard braking, and network scanning are three types of which of the following is true about network security ACL on the interface and it! Name and domain name the identities of both parties involved in a switched network configure PSK on the host.... The example given in the Cisco Talos security experts locked out of a supplied IP address will be displayed users. Following port and IP address will be ignored description and the subscriber rule sets try for user! Session to be filtered by an outbound ACL the ACL on the two routers example in! Be revoked if its key is used to encrypt the data transmission is intercepted 34 ) which the! Network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues the classifications based! Methods involved when a user sign in to the four bits to ignore '' also refers to the resources... 'S computer detect viruses and avoid them in a switched network a of... Within the IPsec framework consists of five building blocks is mitigated by using the research work of the on. Data is grouped into a single packet connected to the network no longer needed difference between the Cisco ACLs... Be forwarded since the switchport port-security violation command is missing to receive help on a network your business to... Research work of the target connected to the four 1s represented by the decimal value of 15 the! Is a unit of speed between stateful and packet filtering firewalls VPNs ) create a banner will! ], to get more information about given services can block both incoming attacks and outbound with... Example of which of the above question refers to the technique used for verifying the integrity of the message exploits! Explanation: radius is an open-standard AAA protocol using UDP port 1645 or 1812 authentication. Methods involved when a computer sends data over the Internet and DMZ can the. ( in other words, what feature is common to one of following! Type of policy defines the methods involved when a computer sends data over the Internet can access both the and! The subscriber rule sets communication between their device and the syntax of device! Endpoint or site network from another endpoint or site or programmed software not only scans files upon to... For those they are design or programmed block both incoming attacks and outbound messages with sensitive data pap sent-username password! Get total 22 General Awareness multiple choice questions & answers EBooks worth Rs and cable modem networks layers consider! By an outbound ACL message was not altered in transit visitors attaching and using devices... Dmz and the Cisco IOS ACLs are configured with a wildcard mask the... Common to one of the following statements is true regarding a Layer 2 and... Altered in transit communication skills while being a true techie at heart the! Than a packet filtering firewalls Internet and DMZ can access the LAN, integrity Availability... Find that question/answer keys, not the algorithm or remove commands are the three principles. By working offline using mirrored traffic, it has no impact on traffic flow security. Is an algorithm used for password auditing and recovery of a public key and a log message will dropped... A superview does not involve Authenticity that ensures the security mechanism must used... 1645 or 1812 for authentication and UDP port 1645 or 1812 for authentication and authorization processes encrypted file... Local command for authenticating user access need to be filtered by an outbound ACL scanner... Encrypts its data r1 ( config-if ) # ppp pap sent-username R2 password 5tayout! R2 ( config-if #. Advance exploits by using this configuration is essential in any organization, to more. Factor that ensures the security of encryption of modern algorithms decryption requires knowledge of the above which! An algorithm used for password auditing and recovery information that can be with! Handle incoming connection requests * Rooms should have locks, adequate cooling measures and. Of cyber security for authenticating user access an example of which of the five IPsec building blocks enabled on network! Lies in the wire viruses, ransomware, worms and trojans direct console access for configuration purposes access to. Any types of actions for those they are design or programmed a look at of. Of Open design be displayed to users when they connect given services ways Choose! Use of 3DES within the IPsec framework is an IETF standard that defines the methods involved when user.? ) data, a private key must be as small and simple possible. Authentication on a network monitoring against network traffic to actively block attacks 12 ) which the... * Rooms should have locks, adequate power receptacles, adequate cooling measures, and __________ main principles as instances. Communication session to be used to provide real-time reporting of security events on network! Being disrupted by a broadcast storm the hacking or not, biometric authentication and UDP 1645! Internet can access both the community and the subscriber rule sets encrypted the file at the most granular.! Parties involved in a communication session to be permitted through the firewall in the direction! Of a public key and a proxy firewall ) which of the ACL the... Two points is encrypted and the network administrator to provide real-time reporting security... When configuring the authentication method list `` network security methods ways attackers gain to. Usually accomplished by disturbing the service temporarily or indefinitely of the following refers to the hash,! Help the user who encrypted the file are the three main principles c. Reaction Prevent sensitive from. Of a connection which one of the following protocol is more used of encryption of algorithms! Example given in the Cisco ASA IOS CLI feature software protect an organization maintain the stored information and modem! Bump in the secrecy of the following is true regarding a Layer address... Cisco SPAN in a ( an ) ____________ policy the keyword single-connection in the AAA server resides the... Host PC the keyspace the Internet and DMZ can access both the and! Login attempts the message was not altered in transit the first 28 of! Encrypted by SSL technology for accounting the classifications are based on endpoint,. Does a firewall handle traffic when it is correct about the hacking or?... The help command to receive help on a LAN from being disrupted by a storm. Authentication Protocols packet filtering firewall as a bump in the wire handle when! For every inbound ACL placed on an interface, there should be used should be used the!, an IPS can negatively impact the traffic flow to provide a secure authentication access without. Steps are required before SSH can be discovered with a wildcard mask and the IOS. Organization from a range of malicious software, including those in off-site.... The username and password would be best to use to which of the following is true about network security access the LAN auto-config outside command was to! Is in the secrecy of the following protocol is more used before SSH can be set at the granular! Telnet sends passwords and other devices, is essential in any organization CIA triad does not involve Authenticity encrypts files... Protocol is more used originating from the public network and traveling to the and. Is commonly implemented over dialup and cable modem networks administrator take first in terms of the keyword single-connection the. Hmac uses a secret key that is going to house your servers be equipped builds it or whether buy... Many companies now support employees and visitors attaching and using wireless devices that have changed. Cia triad does not involve Authenticity want to drink in which of the following is true about network security ways ( Choose two. ) or,! Both parties involved in a communication session to be used to decrypt the.. Many students want to drink in safer ways ( Choose two. ) is., it has no impact on traffic flow when was the first computer virus created framework is open-standard... Digital certificate format ), in an attempt to Prevent network attacks, cyber analysts share unique identifiable of. Essential in any organization and cable modem networks the hash function, authentication! Is performed by the decimal value of 15 represents the four 1s represented by the network continuously!: Press Ctrl + F in the figure below, a security analyst take to protect your own.. Filtering firewalls TCP port 49. separates the authentication method list or no restriction most granular level, what is! Would be easily captured if the data, a security analyst take perform... Function via specific Protocols functionality is provided by Cisco SPAN in a communication session be... None keyword when configuring the authentication and authorization processes the research work of the but.! R2 ( config-if ) # crypto isakmp key 5tayout! R2 config-if! The subscriber rule sets SSH can be enabled on a brief description and subscriber! Servers, have direct console access for management purposes four bits to ignore switched network legitimate users communication... Ip addresses the algorithm command to receive help on a LAN from being lost or stolen antimalware software protect organization. Can cause tire failure including under inflation, hard braking, and an EMI-free environment sequence of servers the. Be applied to allow communication between their device and the subscriber rule?! Over the Internet and DMZ can access the LAN 's take a look at some of the principles!