What two assurances does digital signing provide about code that is downloaded from the Internet? To indicate the CLI EXEC mode, ASA uses the % symbol whereas a router uses the # symbol. It is a type of device that helps to ensure that communication between a device and a network is secure. What algorithm will be used for providing confidentiality? ), What are the three components of an STP bridge ID? Explanation: Tripwire This tool assesses and validates IT configurations against internal policies, compliance standards, and security best practices. In computer networks, it can be defined as an authentication scheme that avoids the transfer of unencrypted passwords over the network. Which statement describes the effect of the keyword single-connection in the configuration? all other ports within the same community. Many students want to drink in safer ways 71. Explanation: Availability refers to the violation of principle, if the system is no more accessible. It defines the default ISAKMP policy list used to establish the IKE Phase 1 tunnel. How to find: Press Ctrl + F in the browser and fill in whatever wording is in the question to find that question/answer. Cybercriminals are increasingly targeting mobile devices and apps. (Choose two. (Choose three.). Which standard feature on NTFS-formatted disks encrypts individual files and uses a certificate matching the user account of the user who encrypted the file? 104. Firewalls. What is the main factor that ensures the security of encryption of modern algorithms? HMACs use an additional secret key as input to the hash function, adding authentication to data integrity assurance. Attacks can happen at any layer in the network security layers model, so your network security hardware, software and policies must be designed to address each area. Only allow devices that have been approved by the corporate IT team. ), 12. Explanation: The RAT is an abbreviation of Remote Access Trojans or Remote Administration Tools, which gives the total control of a Device, which means it, can control anything or do anything in the target device remotely. WebFirewalls are filters network traffic which follows a set of rules and can either be used as hardware or software device. Explanation: Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). Every organization that wants to deliver the services that customers and employees demand must protect its network. the source IP address of the client traffic, the destination port number of the client traffic, the source port number of the client traffic, a server without all security patches applied, creating hashing codes to authenticate data, creating transposition and substitution ciphers, aaa authentication dot1x default group radius. It indicates that IKE will be used to establish the IPsec tunnel for protecting the traffic. D. Access control. A. The only traffic denied is ICMP-based traffic. A packet filtering firewall is able to filter sessions that use dynamic port negotiations while a stateful firewall cannot. RADIUS provides encryption of the complete packet during transfer. Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. As shown in the figure below, a security trap is similar to an air lock. The class maps configuration object uses match criteria to identify interesting traffic. The main reason why these types of viruses are referred to as the Trojans is the mythological story of the Greeks. Which of the following we should configure your systems and networks as correctly as possible? Explanation: The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism. Home network security refers to the protection of a network that connects devicessuch as routers, computers, smartphones, and Wi-Fi-enabled baby monitors and camerasto each other and to the internet within a home. 49. Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim? C. Validation The firewall will automatically drop all HTTP, HTTPS, and FTP traffic. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Quick Heal, Norton etc., so the correct answer is D. 7) It can be a software program or a hardware device that filters all data packets coming through the internet, a network, etc. Explanation: In general, hackers use computer viruses to perform several different tasks such as to corrupt the user's data stored in his system, to gain access the important information, to monitor or log each user's strokes. Once they find the loop whole or venerability in the system, they get paid, and the organization removes that weak points. Match the IPS alarm type to the description. (Choose three. What is true about VPN in Network security methods? WebYou learn that all of the following are true about TCP/IP EXCEPT: It defines how messages are routed from one end of a network to the other. Secure IPS appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection. 127. Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall? ____________ define the level of access a user has to the file system, ranging from read access to full control. Which Cisco solution helps prevent ARP spoofing and ARP poisoning attacks? Which two features are included by both TACACS+ and RADIUS protocols? A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used. Learn more on about us page. (Choose all that apply.). During the second phase IKE negotiates security associations between the peers. 45. 3. 117. It is also known as the upgraded version of the WPA protocol. Only connect to trusted networks.Keep the device OS and other software updated.Backup any data stored on the device.Subscribe to a device locator service with a remote wipe feature.Provide antivirus software for approved BYODs.Use Mobile Device Management (MDM) software that allows IT teams to track the device and implement security settings and software controls. Explanation: It is called an authentication. The first 28 bits of a supplied IP address will be ignored. Protecting vulnerabilities before they are compromised. A. It protects the switched network from receiving BPDUs on ports that should not be receiving them. 2. Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message. 8) Which of the following refers to stealing one's idea or invention of others and use it for their own benefits? The logging service stores messages in a logging buffer that is time-limited, and cannot retain the information when a router is rebooted. Geography QuizPolitical Science GK MCQsIndian Economy QuizIndian History MCQsLaw General KnowledgePhysics QuizGST Multiple Choice QuestionsEnvironmental Science GKCA December 2021CA November 2021CA October 2021CA September 2021CA August 2021CA July 2021CA June 2021CA May 2021CA April 2021, Agriculture Current AffairsArt & Culture Current AffairsAwards & Prizes Current AffairsBank Current AffairsBill & Acts Current AffairsCommittees and Commissions Current AffairsMoU Current AffairsDays & Events Current AffairsEconomic Survey 2020-21 Current AffairsEnvironment Current AffairsFestivals Current AffairsFinance Current AffairsHealth Current AffairsHistory Current AffairsIndian Polity Current AffairsInternational Relationship Current AffairsNITI Aayog Current AffairsScience & Technology Current AffairsSports Current Affairs, B.Com Pass JobsB.Ed Pass JobsB.Sc Pass JobsB.tech Pass JobsLLB Pass JobsM.Com Pass JobsM.Sc Pass JobsM.Tech JobsMCA Pass JobsMA Pass JobsMBBS Pass JobsMBA Pass JobsIBPS Exam Mock TestIndian History Mock TestPolitical Science Mock TestRBI Mock TestRBI Assistant Mock TestRBI Grade B General Awareness Mock TestRRB NTPC General Awareness Mock TestSBI Mock Test. Use dimensional analysis to change: Explanation: Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D. 23) Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? Explanation: The default port number used by the apache and several other web servers is 80. FTP and HTTP do not provide remote device access for configuration purposes. Place extended ACLs close to the source IP address of the traffic. Explanation: It is essential to always keep the firewall on in our computer system. A. An ___ is an approximate number or answer. What distinguishes workgroups from client/server networks? Authentication will help verify the identity of the individuals. SIEM is used to provide real-time reporting of security events on the network. Which of the following are common security objectives? So the correct answer will be A. ), 69. Generate a set of secret keys to be used for encryption and decryption. What is the main difference between the implementation of IDS and IPS devices? DH (Diffie-Hellman) is an algorithm used for key exchange. What action should the administrator take first in terms of the security policy? Which portion of the Snort IPS rule header identifies the destination port? SecureX is a cloud-native, built-in platform that connects the Cisco Secure portfolio and your infrastructure. B. WebFEDVTE Foundations of Incident Management Questions and Answers Graded A+ Political motivations and financial interests are the two most common motivations behind current cyber threats. Explanation: Trojans are a type of malware that will perform any types of actions for those they are design or programmed. Match the security technology with the description. Explanation: The fail-safe Defaults principle of cyber security restricts how privileges are initiated whenever a subject or object is created. AAA is not required to set privilege levels, but is required in order to create role-based views. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data. hostname R1R2(config)# crypto isakmp key 5tayout! What is the effect of applying this access list command? Which command raises the privilege level of the ping command to 7? It prevents traffic on a LAN from being disrupted by a broadcast storm. Next step for AdvancedAnalytics: Use the following information to resolve the error, uninstall this feature, and then run the setup process again. Which two characteristics apply to role-based CLI access superviews? 4) Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else? The traffic must flow through the router in order for the router to apply the ACEs. They are all interoperable. A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Warms are quite different from the virus as they are stand-alone programs, whereas viruses need some type of triggers to activate by their host or required human interaction. Use statistical analysis to eliminate the most common encryption keys. Which algorithm can ensure data integrity? What algorithm is being used to provide public key exchange? Network security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft. ), What are two differences between stateful and packet filtering firewalls? Explanation: Secure segmentation is used when managing and organizing data in a data center. A. Enable IPS globally or on desired interfaces. Transformed text What is typically used to create a security trap in the data center facility? 40. Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. to generate network intrusion alerts by the use of rules and signatures. 70. Use the none keyword when configuring the authentication method list. Frames from PC1 will be forwarded to its destination, and a log entry will be created. What network security testing tool has the ability to provide details on the source of suspicious network activity? An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall. 121. 55) In order to ensure the security of the data/ information, we need to ____________ the data: Explanation: Data encryption is a type of method in which the plain text is converted into ciphertext, and only the authorized users can decrypt it back to plain text by using the right key. Network firewall filter traffic between two or more networks while host Which of these is a part of network identification? The date and time displayed at the beginning of the message indicates that service timestamps have been configured on the router. hostname R2. Refer to the exhibit. One has to deploy hardware, software, and security procedures to lock those apps down. The algorithm used is called cipher. Ping sweeps will indicate which hosts are up and responding to pings, whereas port scans will indicate on which TCP and UDP ports the target is listening for incoming connections. Explanation: Confidentiality ensures that data is accessed only by authorized individuals. 6. 60. Another important thing about Trojans is that the user may not know that the malware enters their system until the Trojan starts doing its job for which they are programmed. ACLs provide network traffic filtering but not encryption. 13. 151. Q. 55. A. address 64.100.0.2R2(config)# crypto isakmp key 5tayout! Ethernet is a transport layer protocol. There are many layers to consider when addressing network security across an organization. 32) When was the first computer virus created? False B. uses legal terminology to protect the organization, Frequent heavy drinking is defined as: Users on the 192.168.10.0/24 network are not allowed to transmit traffic to any other destination. Excellent communication skills while being a true techie at heart. An IPS cannot replace other security devices, such as firewalls, because they perform different tasks. Explanation: It is a type of unsolicited email which is generally sent in bulk to an indiscriminate recipient list for commercial purpose. Which of the following is true regarding a Layer 2 address and Layer 3 address? JavaTpoint offers too many high quality services. Which pair ofcrypto isakmp keycommands would correctly configure PSK on the two routers? (Choose three.). ), 144. These security levels allow traffic from more secure interfaces, such as security level 100, to access less secure interfaces, such as level 0. Explanation: IPS signatures have three distinctive attributes: 37. Forcepoint offers a suite of network security solutions that centralize and simplify what are often complex processes and ensure robust network security is in place across your enterprise. (Choose two.). 139. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. (Choose two. Modules 1 - 4: Securing Networks Group Exam Answers, Modules 5 - 7: Monitoring and Managing Devices Group Exam Answers, Modules 8 - 10: ACLs and Firewalls Group Exam Answers, Modules 11 - 12: Intrusion Prevention Group Exam Answers, Modules 13 - 14: Layer 2 and Endpoint Security Group Exam Answers, Modules 15 - 17: Cryptography Group Exam Answers, Network Security (Version1.0) Modules 13 14: Layer 2 and Endpoint Security Group Test Online, 4.4.7 Lab Configure Secure Administrative Access Answers, Modules 15 17: Cryptography Group Exam Answers Full, 6.5.6 Check Your Understanding Syslog Operation Answers, 9.2.4 Packet Tracer Identify Packet Flow Answers, 15.4.4 Check Your Understanding Cryptology Terminology Answers, 6.2.7 Lab Configure Automated Security Features Answers, 14.1.3 Check Your Understanding Identify Layer 2 Threats and Mitigation Measures Answers, 7.2.6 Packet Tracer Configure Local AAA for Console and VTY Access Answers, 16.1.5 Lab Implement IPsec VTI Site-to-Site VPNs (Answers). Explanation: The buffer overflow and ping of death DoS attacks exploit system memory-related flaws on a server by sending an unexpected amount of data or malformed data to the server. Explanation: The answer is UserID. & other graduate and post-graduate exams. A. What is the difference between an IDS and IPS? The internal hosts of the two networks have no knowledge of the VPN. Which statement describes a difference between the Cisco ASA IOS CLI feature and the router IOS CLI feature? The level of access of employees when connecting to the corporate network must be defined. Refer to the exhibit. Refer to the exhibit. Create a firewall rule blocking the respective website. C. They always enforce confidentiality, Many home users share two common misconceptions about the security of their networks: Home Network Security | You don't need to physically secure your servers as long as you use a good strong password for your accounts. Explanation: A digital certificate might need to be revoked if its key is compromised or it is no longer needed. You need full visibility into your OT security posture to segment the industrial network, and feed IT security tools with rich details on OT devices and behaviors. A security policy should clearly state the desired rules, even if they cannot be enforced. 46) Which of the following statements is true about the Trojans? For this reason, there are many network security management tools and applications in use today that address individual threats and exploits and also regulatory non-compliance. Limit unnecessary lateral communications. (Choose two. (Choose two.). B. What is true about Email security in Network security methods? IPsec: The following true/false questions pertain to the figure below on security associations (SA) from R1 to R2 Evaluate if it is true or false, and explain why. Explanation: An application gateway firewall, also called a proxy firewall, filters information at Layers 3, 4, 5, and 7 of the OSI model. supplicantThe interface acts only as a supplicant and does not respond to messages that are meant for an authenticator. (Select two.). RSA is an algorithm used for authentication. Which type of firewall is the most common and allows or blocks traffic based on Layer 3, Layer 4, and Layer 5 information? Place extended ACLs close to the destination IP address of the traffic. ), * remote access VPNLayer 3 MPLS VPN* site-to-site VPNLayer 2 MPLS VPNFrame Relay, the date and time that the switch was brought online* the MAC address of the switchthe IP address of the management VLANthe hostname of the switch* the bridge priority value* the extended system ID, Which portion of the Snort IPS rule header identifies the destination port? Refer to the exhibit. Remote servers will see only a connection from the proxy server, not from the individual clients. Sometimes malware will infect a network but lie dormant for days or even weeks. Explanation: Microsoft office is a type of software used for creating and managing documents, which is one of the most famous products of the Microsoft organization. What functionality is provided by Cisco SPAN in a switched network? The time on Router03 may not be reliable because it is offset by more than 7 seconds to the time server. (Choose three.). 72. WebWhat is true about all security components and devices? Which statement is a feature of HMAC? 61. It is a type of device that helps to ensure that communication between a Match each IPS signature trigger category with the description.Other case: 38. Network security is a broad term that covers a multitude of technologies, devices and processes. 57) Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions? Each network security layer implements policies and controls. Explanation: The IKE protocol executes in two phases. Verify Snort IPS. 129. IP is network layer protocol. 140. In an AAA-enabled network, a user issues the configure terminal command from the privileged executive mode of operation. specifying source addresses for authentication, authorization with community string priority, host 192.168.1.3, host 192.168.1.4, and range 192.168.1.10 192.168.1.20, host 192.168.1.4 and range 192.168.1.10 192.168.1.20. (Choose two.). This code is changed every day. So the correct answer will be the D. 52) In the CIA Triad, which one of the following is not involved? Which attack is defined as an attempt to exploit software vulnerabilities that are unknown or undisclosed by the vendor? When a RADIUS client is authenticated, it is also authorized. Prevent endpoints from connecting to websites with bad reputations by immediately blocking connections based on the latest reputation intelligence. 19) Which one of the following is actually considered as the first computer virus? Configure Snort specifics. Step 6. Explanation: Port security is the most effective method for preventing CAM table overflow attacks. Traffic from the Internet and LAN can access the DMZ. It establishes the criteria to force the IKE Phase 1 negotiations to begin. so that the switch stops forwarding traffic, so that legitimate hosts cannot obtain a MAC address, so that the attacker can execute arbitrary code on the switch. Organizations must make sure that their staff does not send sensitive information outside the network. Explanation: In general, a router serves as the default gateway for the LAN or VLAN on the switch. To defend against the brute-force attacks, modern cryptographers have as an objective to have a keyspace (a set of all possible keys) large enough so that it takes too much money and too much time to accomplish a brute-force attack. This subscription is fully supported by Cisco. The last five bits of a supplied IP address will be ignored. An administrator discovers that a user is accessing a newly established website that may be detrimental to company security. These types of hackers do not hack the system for their own purposes, but the organization hires them to hack their system to find security falls, loop wholes. 10. Challenge Hardware authentication protocol C. m$^2$/s While it is a good idea to configure a banner to display legal information for connecting users, it is not required to enable SSH.. Explanation: Interaction between the client and server starts via the client_hello message. Because in-band management runs over the production network, secure tunnels or VPNs may be needed. Create a superview using the parser view view-name command. Traffic originating from the inside network going to the DMZ network is not permitted. How the network resources are to be used should be clearly defined in a (an) ____________ policy. What type of network security test can detect and report changes made to network systems? 5) _______ is a type of software designed to help the user's computer detect viruses and avoid them. (Choose two.). 135. All login attempts will be blocked for 4 hours if there are 90 failed attempts within 150 seconds.