Network Security Essentials Quiz Questions and Answers

An administrator-defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three)

Answer :
  • Generate the SSH keys
  • Enable inbound vty SSH sessions
  • Configure the IP domain name on the router

Which component is designed to protect against unauthorized communications to and from a computer?

Answer :
  • Firewall

What is the purpose of the network security accounting function?

Answer :
  • To keep track of the actions of a user

What type of attack may involve the use of tools such as nslookup and fping?

Answer :
  • Reconnaissance attack

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

Answer :
  • Man-in-the-middle attack

A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?

Answer :
  • Data loss through access to personal or corporate instant messaging and social media sites

What are the two characteristics of the RADIUS protocol? (Choose two)

Answer :
  • Encryption of the password only
  • The use of UDP ports for authentication and accounting

When creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco device?

Answer :
  • Remark

What are the two possible limitations of using a firewall in a network? (Choose two)

Answer :
  • A misconfigured firewall can create a single point of failure.
  • Network performance can slow down.

Which type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?

Answer :
  • Application gateway firewall