Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

UGRD-IT6310 Network Security

Study online at https://quizlet.com/_96duah

1. Data Link Layer enables data transfer True


between two devices on the same net-
work.

2. Based with SANS Technology Institute, Network Security


it is the process of making preventative
measures to keep the underlying net-
working infrastructure from any unau-
thorized access.

3. Type of software that is often called as Application Software


end-user programs.

4. Refers to the information system which Integrity


ensures that the information remains ac-
curate.

5. An attack where the hacker mimics an- Impersonation


other employee in the company.

6. It is an end-to-end layer used to deliver Transport Layer


messages to a host

7. An abbreviation that is consider as the CPU


brains of the computer.

8. It is designed to appear as a legit pro- Trojan Horse


gram to gain access to a network.

9. OSI Layer that is sometimes called HCI Application Layer


layer.

10. Any form of security incident that is False


properly handled can and eventually will
turn into a bigger problem.

11. Which of the following is not a way on a.


improving basic security. (Choose all Use easy to remember pass-
that applies) word

1 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
b.
Ignore Updates

c.
Reuse password

d.
Download software to any web-
site available

12. This attack tries to defeat an authenti- Dictionary Attack


cation mechanism by systematically en-
tering each word in a dictionary as a
password.

13. It has an additional ability where they Spyware


can modify security settings of a soft-
ware.

14. It's anything that can interrupt the opera- Threat


tion, functioning, integrity, or availability
of a network or system.

15. It is a security solution by organization Network Detection


to notice any malicious activity in a net-
work.

16. This attack uses any password-crack- Brute-Force Attack


ing software to mathematically calculate
every possible password.

17. Attack that send an email that con- Phishing


tains attachment that loads malware
onto your computer

18. An act that exploits a weakness in a sys- Attack


tem.

19. Is any program that is harmful to a com- Malware


puter user.
2 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah

20. A software that can detect malware. Antivirus Software

21. An attack that allows any unauthorized Tailgating


users a way or passage to get inside a
restricted area.

22. Which of these are not part of security Assurance


model that is very popular to informa-
tion security.

23. it is the one managing the computer Operating System


hardware resources in addition to appli-
cations and data.

24. Adware is a type of malware that re- False


stricts user access to the computer ei-
ther by encrypting files on the hard drive
or locking down the system

25. It is the foundation for all security poli- Security Trinity


cies.

26. Worm has the ability to replicate itself True


without a host program and spread inde-
pendently while viruses rely on human
activity to spread and damage a system
or file.

27. Is the process of using social skills to Social Engineering


encourage people to disclose their cre-
dentials

28. This is a way of adding secondary layer Two-factor authentication


of security to your account password.

29. It serves as a proof and verifies that you Authentication


are the person you say you are or what
you claim to be.

3 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
30. Layer that is responsible for establish- Session Layer
ing and maintaining connections.

31. This attack happens when the attacker Buffer Overflow


or hacker sends too much information to
the application causing it to overflow

32. It is sometimes called TCP hijacking at- Man-in-the-middle attack


tack.

33. Information policy where the data Confidentiality


should be access by an authorized per-
son/s only.

34. It is a combined set of components for Information System


collecting, storing and processing data
and for providing information, facts and
knowledge.

35. Combination of brute force and dictio- Hybrid Attack


nary attack.

36. A set of instructions and execute a spe- Software


cific task/s

37. Which of these are not part of the rea- a.


son why network security is important To expose company assets
(Choose all that applies)
b.
To keep your job as network ad-
ministrator

c.
To gain a competitive advantage

d.
To take advantage of competi-
tors confidential information

38. True
4 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
In implementing network security, com-
pany should invest more in preventing
or avoiding any security breach over de-
tecting and responding to any form of
attack

39. It is the connection of two or more com- Network


puter that share its resources

40. It is a type of an injection attack that SQL Injection


makes it possible to insert and execute
malicious SQL statements

41. It determines whether you are allowed to authorization


access a specific information or file.

42. Which of these are not part of the reason To exploit vulnerabilities in the
why we need to secure our network? system

43. An information that is only accessed by Confidential information


an authorized person.

44. Internet is an example of a network. True

45. Areas of Security Trinity where they Prevention


need to have a good security measures
to avoid hackers from getting access to
the network.

46. Availability refers to the ability of a net- False


work to protect its information from any
unauthorized access.

47. It is the network security solution by an detect


institute to
any malicious activity in a network.

48. It is considered as a crucial part of infor- Security


mation systems

5 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
49. It has a vital role in an information sys- Network
tem because it is the one that allows a
company to link their computers and its
users

50. System that plays a vital part in Network Information


security since it is the information that
an organization is trying to protect and
avoid from any unauthorized access

51. Any form of security incident that is False


not properly handled can and eventual-
ly wont turn into a bigger problem that
will lead to a damaging data breach and
wont cause large amount of expense or
it will collapse the whole system

52. System that are intended to manage the System Software


computer itself such as the operating
system.

53. It is the tangible parts of a computer Hardware


system.

54. It is the process of taking preventa- Network Security


tive measures to keep the network infra-
structure from any unauthorized access,
misuse of important information

55. It is a model designed to guide policies CIA Triad Information Security


for information security within an orga-
nization.

56. It ensures that the information in an in- Integrity


formation system is accurate.

57. It is a structured procedure for taking Response


care of any security incidents, breaches,
and network threats.

6 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
58. It will help the company to provide a bet- Security Trinity
ter strategy in keeping a data secured
while avoiding intruders to alter or steal
important and confidential information.

59. How many key phases are there in an 6


incident response plan ?

60. Big corporations are not at risks to any False


form of security breach.

61. It has been developed by ISO in the year OSI Reference Model
1984.

62. Two different devices can communicate True


with each other regardless of the manu-
facturer as long as they have the same
protocol.

63. It is a set of standards that are widely Protocol


used as a basis for communication.

64. SQL stands for? Structured Query Language

65. What are the signs and symptoms that a.


your device/s are getting infected by any Increased CPU usage
malware. (Choose all that applies)
b.
Software freezes or crashes

c.
Appearance of strange desktop
icons

d.
Slower computer performance

66. Which of the following are not part of Transfer Layer


OSI Layer?

7 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
67. These layers work together to transmit OSI Layer
the data from one person to another
world wide.

68. It provides data routing paths where Network Layer


data will take for network communica-
tion.

69. This layer involves devices such as Physical Layer


router, UTP Cables and other networking
devices to transfer data.

70. These are what make networks prone to Vulnerabilities


information loss and downtime

71. A type of malware that automatically Adware


sends advertisements to the users.

72. It may contain phishing scams and mal- Spam


ware.

73. This layer is also called human-comput- Application Layer


er interaction layer.

74. It pretends to be a legitimate programs Trojan Horse


in order to gain access to a system.

75. It is anything that can disrupt the opera- Threat


tion, functioning, integrity, or availability
of a network or system

76. Brute force attack are often successful False


because most of the users uses different
ordinary words as their passwords.

77. Worms can be classified as a type of False


computer virus that needs a third party
or a user to replicate and spread through
the system.

8 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
78. Type of malware that may contain an at- Phishing
tachment to an email that loads malware
onto your computer system.

79. any program design to damage specific Malware


file or computer system.

80. It is an act that exploits a vulnerability. Attack

81. Which of the following are the com- SWITCH 1>enable


mands for disabling a port in a Network SWITCH 1#configure terminal
Switch. Choose any that Apply SWITCH 1(config)#interface
f0/2
SWITCH 1(config-if)#shutdown

SWITCH>enable
SWITCH#config term
SWITCH(config)#interface
range f0/4-8
SWITCH(config-if-range)#shut-
down

82. This service is the one responsible for Workstation service


handling connections to a remote net-
work resources.

83. Without this service on your environ- Server service


ment, you won't be able to share any of
your resources

84. It ensure that the essential and vital ser- Services running
vices are only running on the system

85. Which of the following are not part of the Uninstall Necessary Software
steps in order to harden your system.
Choose only one.

86. It is a standard configuration that is ap- Security baseline


proved by any company for a specific
9 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
type of system or device for being se-
cure

87. Two Categories of a Group Policy. User settings


Choose any that apply.
Computer settings

88. A popular feature of Windows that al- Security Templates


lows you to harden multiple systems
quickly.

89. is a crucial security update that you Security hot-fix


should always apply to your system

90. It is a core feature of Windows that allow Group Policy


the network administrator to enable and
disable different features in Windows

91. Is a service responsible for sending Messenger service


messages to other computers or users.

92. It is a software service that manages Print Spooler service


the process of printing in the Windows
environment.

93. NTFS and FAT/FAT32 is an example of? File system

94. File system that has a features like per- NTFS


missions, encryption, quotas, and audit-
ing services.

95. Large volume of data is also known as Big Data

96. It is an advanced method of handling an Exception handling


error.

97. The following codes is an example of? try/catch block


Try
MessageBox.Show(cdbl(txtTotalVal-
ue.text) + cdbl(txtTotalVAT.text))
10 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
Catch ex as InvalidCastException
MessageBox.Show("Please supply 2
numbers as input")
Catch ex as Exception
MessageBox.Show("An error has oc-
curred. Please try again.")
End Try

98. It is a security concern because most Scripting


scripting languages can make some al-
teration to your system.

99. To avoid and prevent this type of attack, False


users should always choose the "Re-
member Me" option when logging in to
any web site.

100. very single application must go through True


the options and check whether each ap-
plication is configured in the most se-
cure state.

101. These are logon information from all the Cookies


websites you visit and is stored in mem-
ory on computer

102. It is a restricted area with a resource that Sandbox


these Java applications can access.

103. SMTP and FTP are used to transfer infor- True


mation over a computer network.

104. It is another term for a runtime error Exception

105. It can manipulate your system including ActiveX controls


the deletion of the important files on
your computer.

106. SCADA

11 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
It is a special system used in industrial
environments and settings to monitor
their operations

107. Always disable unnecessary features of True


the web server that are not going to be
used

108. It is the idea of developing a database NoSQL database


system to store and retrieve large vol-
umes of data

109. Developers should always implement True


validation at both the client and the serv-
er to obtain high level of security.

110. Software that makes each network de- Firmware


vices works and do its job is called?

111. It is an advanced method of error han- Exception handling


dling.

112. Software vendors used to find out about True


the vulnerabilities of their system after
receiving some reports from their users.

113. Which of these are not part of the two Window settings
categories of Group Policy. (Choose any
that applies) Security settings

114. it is a type of reports that is only used Alerts


to notify the system administrator that
there's a change occurred in the system.

115. Another term for Port security. MAC limiting

116. It is a core feature of Windows that per- Group Policy


mits the network administrator to enable
and disable different features in Win-
dows
12 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah

117. It is a type of reporting method that is Alarms


used to report critical events that typi-
cally require some form of actions from
the system or network administrator.

118. Networking device that has a filtering Switch


feature where it sends the traffic only to
the port of the destination device.

119. Networking device that sends the pack- Hub


ets to every one of its ports to ensure
that it will reach its intended destination.

120. It can limit which devices can connect to Port security


a specific port on the switch by listing
specific MAC addresses with the port.

121. You can configure user rights on the Local Policies


system, auditing, and other security set-
tings such as creating a logon banner

122. It means that the developer checks all Input Validation


the data to make sure that the informa-
tion provided by the user in the applica-
tion is valid and correct.

123. True or False? IEEE 802.1X may use False


TACACS+ to communicate the EAP iden-
tity to the authentication server.

124. Which of the following best describes Authentication validates the


the difference between authentication user's identity, whereas autho-
and authorization? rization determines what that
user is permitted to do.

125. True or False? RADIUS can be used for True


device administration AAA.

126. Which of the following is true?

13 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
The EAP communication oc-
curs between the supplicant and
theauthentication server.

127. What is the name of the "secure cookie" Protected access credential
used with EAP-FAST that can be used in (PAC)
lieu of a certificate, or even in addition
to a certificate?

128. Which of the following protocols is best RADIUS


suited for authenticating and authoriz-
ing a user for network access AAA?

129. Which supplicant(s) is capable of EAP Cisco AnyConnect NAM


chaining?

130. True or False? MSCHAPv2 may be used False


to perform machine authentication with
an LDAP connection to Active Directory.

131. Which of the following protocols is best TACACS+


suited for granular command level con-
trol with device administration AAA?

132. Why is RADIUS or TACACS+ needed? Both RADIUS and TACACS+ ex-
Why can't the end user authenticate di- tend the Layer-2 authentication
rectly to the authentication server? protocols, allowing the end user
to communicate with an authen-
tication server that is not Layer-2
adjacent

133. What are the three main components of Authentication server, suppli-
IEEE 802.1X? cant, authenticator

134. Which of the following are types of AAA Device administration


as related to the topics of this exam?
Network access

135. True

14 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
True or False? A tunneled EAP type is
able to use native EAP types as its inner
method.

136. What is the purpose of an outer identity? The outer identity provides a
mechanism to authenticate the
identity of the endpoint during
the tunnel establishment phase.

137. Which of the following best describes an When communicating with an


AV-pair? AAA protocol, the AV-pair stipu-
lates a common attribute or ob-
ject and its assigned value.

138. Which of the following Cisco products Cisco Secure Access Control
should be used for device administra- Server (ACS)
tion with TACACS+?

139. True or False? The supplicant is re- False


quired to trust the certificate of the au-
thentication server before it will form the
TLS tunnel within which the EAP trans-
action will occur.

140. Which of the following are TACACS+ START


messages sent from the AAA client to
the AAA server? (Select all that apply.)

141. When using RADIUS, what tells the AAA The Service-Type field.
server which type of action is being au-
thenticated?

142. True or False? A machine authentication True


may use EAP-FAST.

143. When configuring a Cisco switch for Both at global configuration level
802.1X, at which level of the configu- as well as per interface.
ration do the 802.1X-related commands
exist?

15 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
144. When configuring a Cisco Wireless LAN The authentication and autho-
Controller (WLC) for communication rization RADIUS servers can be
with ISE, what must be configured for pointed to the same ISE PSN.
the wireless LAN (WLAN)? (Choose
two.)

145. True or False? Cisco switches should be False


configured in production to send syslog
messages to the ISE MNT node.

146. What is the purpose of adding a user The switch can send period-
with the username radiustest password ic RADIUS Access-Requests
password command? to the AAA servers to verify
whether they are still alive. The
username and password will be
used for that test.

147. True or False? 802.1X can be configured False


on all switch interfaces, including Lay-
er-3 interfaces.

148. Which of the following technologies en- Flex-Auth


ables an administrator to maintain the
same configuration on all access ports,
on all switches, regardless of the type of
device connecting to the network?

149. Which host mode will permit a virtually Multi-Host


unlimited number of endpoints per port,
allowing all subsequent MAC addresses
to share the authorization result of the
first endpoint authorized?

150. Which interface-level command is the authentication port-control auto


equivalent of "turn authentication on"?

151. Which command on a Cisco switch will show aaa servers


display the current status of the AAA
server(s)?

16 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
152. Which command will validate that show authentication session in-
authentications are being attempted, terface <interface>
which authentications are successful,
and which authorization results have
been assigned?

153. True or False? The profiling service is False


enabled by default on ISE policy service
nodes.

154. Name three ways in which an endpoint Endpoint identity groups


profile can be used in an authorization
policy rule? EndPointPolicy attribute

Logical profiles

155. Which probe is used to trigger the SNM- Both A and D


PQUERY probe to query a NAD?

156. Which three probes exist with device CDP, DHCP, LLDP
sensor?

157. How are updated profiles distributed to Cisco's Profiler Feed Service.
customer ISE deployments?

158. What determines when an endpoint is The certainty value must equal
assigned to a profile? or exceed the minimum certainty
value of the profile.

159. Which ISE tool enables an administrator Endpoints Drill-down


to drill down in to the profiles that have
been assigned to locate a specific end-
point with that profile?

160. What are two ways to collect HTTP user Directly from ISE web portals
agent strings?
SPAN port mirroring

161. False

17 / 18
UGRD-IT6310 Network Security
Study online at https://quizlet.com/_96duah
True or False? ISE deployments must
wait for Feed Service updates for new
profiles.

162. What will happen when an ISE admin- All nonconflicting profiles will be
istrator has modified a profile and then downloaded and installed. The
a Feed Service update is downloaded conflicting profiles will be ig-
that contains an updated version of that nored.
profile?

18 / 18

You might also like