WAN Q4

  1. Which of the following individuals is considered a "good guy"?




    B) White hat
  2. Which of the following describes an Open Network?




    D) All of the above
  3. What is vulnerability?




    C) The degree of weakness which is inherent in every network and device
  4. Match the term to the associated description.

    Description:
    operating system weaknesses
    unsecured user accounts
    network equipment weaknesses
    unsecured default settings
    politics
    TCP/IP weaknesses
    lack of disaster recovery plan 

    Term:
    Security Policy Weakness
    Technology Weaknesses 
    Configuration Weaknesses
    • operating system weaknesses => Technology Weaknesses
    • unsecured user accounts => Configuration Weaknesses
    • network equipment weaknesses => Technology Weaknesses
    • unsecured default settings => Configuration Weaknesses
    • politics => Security Policy Weakness
    • TCP/IP weaknesses => Technology Weaknesses
    • lack of disaster recovery plan => Security Policy Weakness
  5. Match the mitigation actions with the associated threats.

    Threats:
    Use security cameras
    Humidity control
    Install UPS systems
    Use neat cable runs

    Mitigation Actions:
    Hardware threats
    Environmental threats
    Electrical threats
    Maintenance threats
    • Use security cameras => Hardware threats
    • Humidity control => Environmental threats
    • Install UPS systems => Electrical threats
    • Use neat cable runs => Maintenance threats
  6. Match the term to the associated description.

    Term:
    Reconnaissance attack
    Password attack
    Worms, virus, Trojan horse
    DoS attack

    Description:
    dictionary cracking and brute force attack
    using ping sweep, port scans, and packet sniffers to gain information about a network
    flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
    malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
    • Reconnaissance attack => using ping sweep, port scans, and packet sniffers to gain information about a network
    • Password attack => dictionary cracking and brute force attack
    • Worms, virus, Trojan horse => malicious software designed to damage a system, replicate itself, or deny services or access to networks, systems, or services
    • DoS attack =>  flooding a network device with traffic in an attempt to render it unusable for legitimate traffic
  7. What is the function of an IDS?




    D) Detect attacks against a network and send logs to a management console.
  8. Which of the following must be configured first before configuring SSH on VTY lines? (Choose 2)




    • A) domain name    
    • c) hostname
  9. Which protocol should be used when strong privacy and session integrity are needed for remote router administration?





    B) SSH
  10. What is the configuration register setting that will cause the router to bypass the startup configuration?




    B) 0x2142
Author
kirin
ID
167247
Card Set
WAN Q4
Description
Wide Area Network Quiz 4 - Network Security
Updated