SECURITY - FOUNDATIONS
.A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two
primary functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router
.A _______ attack send TCP/IP traffic to each and every port to learn which services are running.
Spoofing
Port scanning
Ping flood
SQL Injection - ANSWER-Port Scanning
.A bridge _________________________________________________
a. connects wireless devices to the network using AES
b. connects storage systems using IP based connections
c. connects two networks by forwarding traffic without analysis for which host receives the data
d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by
forwarding traffic without analysis for which host receives the data
.A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password to see if
they can log in as the coworker. Which type of vulnerability does this create?
a. BYOD
b. Weak password
c. Default password
,d. Misconfigured firewall rules - ANSWER-Default password
.A company is concerned with traffic that flows through the network. There is a concern that there may be
malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to
detect potential malware traffic on the network?
IDS
firewall
Honeypot
NAC - ANSWER-IDS
.A company needs to secure the network using a security system that can inspect the network traffic's payload
to prevent attacks. What type of firewall would you recommend?
Application Firewall
Stateful Firewall
Packet Filtering
Layer 3 or 4 Firewall - ANSWER-Application Firewall
.A company provides access to employees' tax and personal information via a public-facing web portal. What
should the company implement to encrypt employees' web access to this information?
a. Transport layer security (TLS)
b. Network intrusion detection system (NIDS)
c. Advanced encryption standard (AES)
d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS)
.A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which
type of hackers would the cybersecurity specialist be least concerned with?
,Gray hat hackers
Black hat hackers
Script kiddies
White hat hackers - ANSWER-White hat hackers
.A hub is the device of choice to decrease traffic on a network segment.
True
False - ANSWER-False
.A malicious user was able to lock a user's account after guessing the user's password multiple times
unsuccessfully.
Which category of the CIA triad did the malicious user target in this attack?
a. Confidentiality
b. Integrity
c. Availability
d. Accessibility - ANSWER-c. Availability
.A malicious user was able to perform a password brute force attack on a human resource email account and is
now reading through all their emails. Which category of the CIA triad was compromised?
Authentication
Confidentiality
Availability
Integrity - ANSWER-Confidentiality
, .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should
the admin use?
Ping
netstat
nmap
TCP_Function - ANSWER-nmap (Network Mapper)
It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to
detect installed applications.
.A router is a Layer 3 device.
True
False - ANSWER-True
.A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall
operate?
a. A stateful firewall uses a list to allow connections
b. A stateful firewall makes requests on behalf of other systems on a Network
c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request.
d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful
firewall that compares all inbound traffic to ensure there is an outbound request.
.A switch forwards data only to the port that are connected to the destination device. It knows which port to
forward it to based on which value?*