Network Security Essentials Quiz Questions and Answers
Which component is designed to protect against unauthorized communications to and from a computer?
Answer :
Firewall
What is the purpose of the network security accounting function?
Answer :
To keep track of the actions of a user
What type of attack may involve the use of tools such as nslookup and fping?
Answer :
Reconnaissance attack
An administrator-defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three)
Answer :
Generate the SSH keys
Enable inbound vty SSH sessions
Configure the IP domain name on the router
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?
Answer :
Data loss through access to personal or corporate instant messaging and social media sites
What are the two characteristics of the RADIUS protocol? (Choose two)
Answer :
Encryption of the password only
The use of UDP ports for authentication and accounting
Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?
Answer :
Man-in-the-middle attack
When creating an ACL, which keyword should be used to document and interpret the purpose of the ACL statement on a Cisco device?
Answer :
Remark
What are the two possible limitations of using a firewall in a network? (Choose two)
Answer :
A misconfigured firewall can create a single point of failure.
Network performance can slow down.
Which type of firewall makes use of a proxy server to connect to remote servers on behalf of clients?