This question has been answered
Question

James, a network admin in a large US based IT firm, was asked to audit

and implement security controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James has implemented both blacklisting and whitelisting ACLs. Which layer of Defense-in-Depth architecture is Jason working on currently?
Group of answer choices


Application Layer


Host Layer


Internal Network Layer


Perimeter Layer
 
Flag this Question
Question 2
1 pts
Xenon is a leading real estate firm located in Australia. Recently, the company had decided a bid amount for a prestigious construction project and was sure of being awarded the project. Unfortunately, the company lost the tender to one of its competitors. A few days later, while performing a network scan, the network admin identified that somebody had captured the confidential e-mails conversions related to the tender. Upon further investigation, the admin discovered that one of the switch ports was left open and an employee had plugged into the network using an Ethernet cable. Which attack did the employee perform in the above situation?
Group of answer choices




Network Sniffing


Password Attack


Social Engineering Attack


Man-in-the-Middle Attack
 
Flag this Question
Question 3
1 pts
Arman transferred some money to his friend's account using an online banking service. After a few hours, his friend informed him that he hadn't received the money yet. Arman logged on to the bank's website to investigate and discovered that the amount had been transferred to an unknown account instead. The bank, upon receiving Arman's complaint, discovered that someone had established a station between Arman's and the bank server's communication system. The station intercepted the communication and inserted another account number replacing his friend's account number. What is such an attack called?
Group of answer choices




Privilege Escalation


DNS Poisoning


Man-in-the-Middle Attack


DNS Cache Poisoning
 
Flag this Question
Question 4
1 pts
A popular e-commerce company has recently received a lot of complaints from its customers. Most of the complaints are about the customers being redirected to some other website when trying to access the e-com site, leading to all their systems being compromised and corrupted. Upon investigation, the network admin of the firm discovered that some adversary had manipulated the company's IP address in the domain name server's cache. What is such an attack called?
Group of answer choices




DNS Poisoning


DNS Application


DNS Attacked by DDoS


DNS Hijacking
 
Flag this Question
Question 5
1 pts
Riya bought some clothes and a watch from an online shopping site a few days back. Since then, whenever she accesses any other application (games, browser, etc.) on her mobile, she is spammed with advertisements for clothes and watches similar to the ones she bought. What can be the underlying reason for Riya's situation?
Group of answer choices




Riya's system was infected by Adware


Riya's system was infected by Spyware


Riya's system was infected by Backdoor


Riya's system was infected by Rootkit
 
Flag this Question
Question 6
1 pts
Which of the following DDoS attacks overloads a service by sending inundate packets?
Group of answer choices




Network-centric attack


Application-centric attack


Web-centric attack


System-centric attack
 
Flag this Question
Question 7
1 pts
Identify the password attack technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is used for other keys?
Group of answer choices




Dictionary Attack


Brute Forcing Attack


Hybrid Attack


Birthday Attack
 
Flag this Question
Question 8
1 pts
Jorge has developed a core program for a mobile application and saved it locally on his system. The next day, when he tried to access the file to work on it further, he found it missing from his system. Upon investigation, it was discovered that someone got into his system since he had not changed his login credentials, and that they were the ones that were given to him by the admin when he had joined the organization. Which of the following network security vulnerabilities can be attributed to Jorge's situation?
Group of answer choices




System account vulnerabilities


User account vulnerabilities


Default password and settings


Network device misconfiguration
 
Flag this Question
Question 9
1 pts
HexCom, a leading IT Company in the USA, realized that their employees were having trouble accessing multiple servers with different passwords. Due to this, the centralized server was also being overburdened by avoidable network traffic. To overcome the issue, what type of authentication can be given to the employees?
Group of answer choices




Two-Factor Authentication


Biometric Authentication


Single Sign-on (SSO)


Smart Card Authentication
 
Flag this Question
Question 10
1 pts
In Public Key Infrastructure (PKI), which authority is responsible for issuing and verifying the certificates?
Group of answer choices




Registration authority


Certificate authority


Digital Certificate authority


Digital signature authority
 
Flag this Question
Question 11
1 pts
To secure his company's network, Tim the network admin, installed a security device that inspected all inbound and outbound network traffic for suspicious patterns. The device was configured to alert him if it found any such suspicious activities. Identify the type of network security device installed by Tim.
Group of answer choices




Firewall


Honeypot


Proxy server


Intrusion Detection System (IDS)
 
Flag this Question
Question 12
1 pts
John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the network admin to block such websites. What kind of network security device can be used to implement John's decision?
Group of answer choices




Firewall


Internet Content Filter


Proxy server


Network Protocol Analyzer
 
Flag this Question
Question 13
1 pts
Which authorization lets users access a requested resource on behalf of others?
Group of answer choices




Explicit Authorization


Decentralized Authorization


Implicit Authorization


Centralized Authorization
 
Flag this Question
Question 14
1 pts
Delta IT solutions suffered a substantial data loss translating into a huge monetary loss for them. While investigation, the network admin analyzed all the packets and traffic transmitted across the network and identified that some user, within the organization, had leaked the data. Which of the following devices could have helped the network admin reach this conclusion?
Group of answer choices




Internet Content Filter


Network Access Control


Network Protocol Analyzer


Intrusion Detection System
 
Flag this Question
Question 15
1 pts
Which authentication technique involves mathematical pattern-recognition of the colored part of the eye behind the cornea?
Group of answer choices




Iris Scanning


Retinal Scanning


Facial Recognition


Vein Scanning
 
Flag this Question
Question 16
1 pts
On which layer of the OSI model does the packet filtering firewalls work?
Group of answer choices




Network Layer


Application Layer


Session Layer


Physical Layer
 
Flag this Question
Question 17
1 pts
Which RAID level does not provide data redundancy?
Group of answer choices




RAID level 0


RAID level 1


RAID level 50


RAID level 10
 
Flag this Question
Question 18
1 pts
Which encryption algorithm does the S/MIME protocol implement for digital signatures in emails?
Group of answer choices




Rivest-Shamir-Adleman encryption


Digital Encryption Standard


Triple Data Encryption Standard


Advanced Encryption Standard
 
Flag this Question
Question 19
1 pts
On which of the following OSI layers does the Pretty Good Privacy (PGP) work?
Group of answer choices




Application


Data Link


Network


Transport
 
Flag this Question
Question 20
1 pts
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
Group of answer choices




Hub-and-Spoke


Full Mesh


Star


Point-to-Point
 
Flag this Question
Question 21
1 pts
What is composite signature-based analysis?
Group of answer choices




Multiple packet analysis is required to detect attack signatures


Attack signatures are contained in packet headers


Attack signatures are contained in packet payloads


Single Packet analysis is enough to identify attack signatures
 
Flag this Question
Question 22
1 pts
John is backing up files that have been changed or created since the last full backup. Which backup technique is John implementing?
Group of answer choices




Incremental


Differential


Full


Normal
 
Flag this Question
Question 23
1 pts
What is a person, who offers formal experienced testimony in the court, called?
Group of answer choices




Expert Witness


Evidence Manager


Evidence Documenter


Attorney
 
Flag this Question
Question 24
1 pts
An insider in Hexagon, a leading IT company in USA, was testing a packet crafting tool. This tool generated a lot of malformed TCP/IP packets which crashed the main server's operating system leading to restricting the employees' accesses. Which attack did the insider use in the above situation?
Group of answer choices




DoS attack


Session Hijacking


Man-in-the-Middle


Cross-Site-Scripting
 
Flag this Question
Question 25
1 pts
Which biometric technique authenticates people by analyzing the layer of blood vessels at the back of their eyes?
Group of answer choices




Fingerprinting


Iris Scanning


Retina Scanning


Vein Structure Recognition
 
Flag this Question
Question 26
2 pts
Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
Group of answer choices




IDS/IPS


Network Protocol Analyzer


Proxy Server


Honeypot
 
Flag this Question
Question 27
2 pts
Identify the firewall technology that monitors the TCP handshake between the packets to determine whether a requested session is legitimate.
Group of answer choices




Packet Filtering Firewall


Stateful Multilayer Inspection


Circuit Level Gateway


Network Address Translation
 
Flag this Question
Question 28
2 pts
Which of the following commands can be used to disable unwanted services on Debian, Ubuntu and other Debian-based Linux distributions?
Group of answer choices




# chkconfig [service name] off


# chkconfig [service name] -del


# service [service name] stop


# update-rc.d -f [service name] remove
 
Flag this Question
Question 29
2 pts
Identify the network topology in which the network devices are connected such that every device has a point-to-point link to all other devices.
Group of answer choices




Star Topology


Hybrid Topology


Mesh Topology


Bus Topology
 
Flag this Question
Question 30
2 pts
What is the possible number of IP addresses that can be assigned to the hosts present in a subnet with a 255.255.255.224 subnet mask?
Group of answer choices




62


30


14


126
 
Flag this Question
Question 31
2 pts
What is the IT security team responsible for effectively managing the security of the organization's IT infrastructure, called?
Group of answer choices




Grey Team


Red Team


Blue Team


Yellow Team
 
Flag this Question
Question 32
2 pts
Which of the following information security standards defines security policies, technologies and ongoing processes for organizations that handle cardholder information for debit, credit, prepaid, e-purse, ATM, and POS cards?
Group of answer choices




Health Insurance Portability and Accountability Act (HIPAA)


Payment Card Industry Data Security Standard (PCI-DSS)


Information Security Acts: Gramm-Leach-Bliley Act (GLBA)


Information Security Acts: Sarbanes Oxley Act (SOX)
 
Flag this Question
Question 33
2 pts
Which of the following Wireshark filters can a network administrator use to view the packets without any flags set, in order to detect TCP Null Scan attempts?
Group of answer choices




TCP.flags==0x000


tcp.flags==0X029


tcp.flags==0x003


tcp.dstport==7
 
Flag this Question
Question 34
2 pts
Which phase of vulnerability management deals with the actions for patching the discovered vulnerabilities?
Group of answer choices




Assessment


Verification


Remediation


Mitigation
 
Flag this Question
Question 35
2 pts
Which component of the data packets is encrypted in the Transport mode encryption of an IPsec server?
Group of answer choices




Payload


Header


Header and Payload


Encryption is not used in IPsec server
 
Flag this Question
Question 36
2 pts
Which wireless networking topology setup requires same channel name and SSID?
Group of answer choices




Ad-Hoc standalone network architecture


Infrastructure network topology


Hybrid topology


Mesh topology
 
Flag this Question
Question 37
2 pts
Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?
Group of answer choices




TACACS+


RADIUS


CHAP


PAP
 
Flag this Question
Question 38
2 pts
Identify the attack where an attacker manipulates or tricks people into revealing their confidential details like bank account information, credit card details, etc.?
Group of answer choices




Social Engineering Attacks


Port Scanning


DNS Footprinting


ICMP Scanning
 
Flag this Question
Question 39
2 pts
Which of the following Wireshark filters allows an administrator to detect SYN/FIN DDoS attempt on the network?
Group of answer choices




tcp.flags==0x003


tcp.flags==0X029


TCP.flags==0x300


tcp.dstport==7
 
Flag this Question
Question 40
2 pts
Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?
Group of answer choices




Disk mirroring


Disk stripping


Data splitting


Disk partition
 
Flag this Question
Question 41
2 pts
Which of the following tools can be used to update Debian-based Linux distributions?
Group of answer choices




apt-get


up2date


swarets


autoupdate
 
Flag this Question
Question 42
2 pts
An IT company has just been hit with a severe external security breach. To enhance the company's security posture, the network admin has decided to first block all the services and then individually enable only the necessary services. What is such an Internet access policy called?
Group of answer choices




Prudent Policy


Permissive Policy


Promiscuous Policy


Paranoid Policy
 
Flag this Question
Question 43
2 pts
Which of the following standards does a Cloud service provider has to comply with, to protect the privacy of its customer's personal information?
Group of answer choices




ISO/IEC 27018


ISO/IEC 27019


ISO/IEC 27020


ISO/IEC 27021
 
Flag this Question
Question 44
2 pts
Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer's information?
Group of answer choices




GLBA


FISMA


DMCA


SOX
 
Flag this Question
Question 45
2 pts
Wallcot, a retail chain in US and Canada, wants to improve the security of their administration offices. They want to implement a mechanism with two doors. Only one of the doors can be opened at a time. Once people enter from the first door, they have to be authorized to open the next one. Failing the authorization, the person will be locked between the doors until an authorized person lets him or her out. What is such a mechanism called?
Group of answer choices




Mantrap


Physical locks


Concealed detection device


Alarm system
 
Flag this Question
Question 46
2 pts
David, a network and system admin, encrypted all the files in a Windows system that supports NTFS file system using Encrypted File Systems (EFS). He then backed up the same files into another Windows system that supports FAT file system. Later, he found that the backup files were not encrypted. What could be the reason for this?
Group of answer choices




EFS could only encrypt the files that follow NTFS


FAT files cannot be encrypted


EFS is not the encryption system used in Windows


Copied files loses their encryption
 
Flag this Question
Question 47
2 pts
Patrick wants to change the file permission of a file with permission value 755 to 744. He used a Linux command chmod [Permission Value] [File Name] to make these changes. What will be the change in the file permission?
Group of answer choices




He changed the file permission from rwxr-xr-x to rwx-r--r--


He changes the file permission from rwxr-xr-x to rw-rw-rw-


He changed the file permission from rw------- to rw-r--r--


He changed the file permission from rwxrwxrwx to rwx------
 
Flag this Question
Question 48
2 pts
An organization's web server was recently compromised, triggering its admin team into action to defend the network. The admin team wants to place the web server in such a way that, even if it is attacked, the other network resources will be unavailable to the attacker. Moreover, the network monitoring will easily detect the future attacks. How can the admin team implement this plan?
Group of answer choices




They can place the web server outside of the organization in a remote place


They can remove the web server from their organization


They can place it in a separate DMZ area behind the firewall


They can place it beside the firewall
 
Flag this Question
Question 49
2 pts
A stateful multilayer inspection firewall combines the aspects of Application level gateway, Circuit level gateway and Packet filtering firewall. On which layers of the OSI model, does the stateful multilayer inspection firewall work?
Group of answer choices




Network, Session & Application


Physical & Application


Session & Network


Physical, Session & Application
 
Flag this Question
Question 50
2 pts
Daniel works as a network administrator in an Information Security company. He has just deployed an IDS in his organization's network and wants to calculate the false positive rate for his implementation. Which of the following formula can he use to do so?
Group of answer choices




False Negative/(False Negative + True Positive)


False Positive/(False Positive + True Negative)


True Negative/(False Negative + True Positive)


False Negative/(True Negative + True positive)

Answered by Expert Tutors
Step-by-step explanation
James, a network admin in a large US based IT firm, was asked to audit and implement security controls over all network layers to achieve
Get unstuck

338,976 students got unstuck by Course
Hero in the last week

step by step solutions

Our Expert Tutors provide step by step solutions to help you excel in your courses