Advanced Network Security Study Guide Questions - 699 Verified Questions

Page 1


Advanced Network Security Study Guide Questions

Course Introduction

Advanced Network Security explores sophisticated techniques and methodologies for protecting networked systems against evolving cyber threats. The course delves into topics such as advanced cryptographic protocols, network perimeter defenses, intrusion detection and prevention systems, secure network architecture, vulnerability assessment, and incident response strategies. Emphasis is placed on real-world case studies and hands-on laboratory exercises that simulate attack and defense scenarios, fostering a deep understanding of how to design, implement, and manage robust security measures in complex network environments. Students will also examine emerging trends like zero trust models, software-defined networking (SDN) security, and the implications of artificial intelligence in cybersecurity.

Recommended Textbook

Guide to Network Defense and Countermeasures 3rd Edition by Randy Weaver

Available Study Resources on Quizplus 14 Chapters

699 Verified Questions

699 Flashcards

Source URL: https://quizplus.com/study-set/2179 Page 2

Chapter 1: Network Security Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43421

Sample Questions

Q1) An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides

A)auditing

B)biometrics

C)DMZ

D)DDoS attack

E)packet filters

F)port

G)RBAC

H)signatures

I)socket

J)worm

Answer: F

Q2) A worm creates files that copy themselves repeatedly and consume disk space.

A)True

B)False

Answer: True

Q3) ______________ do not require user intervention to be launched; they are self-propagating.

Answer: Worms

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: TCP-IP

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43422

Sample Questions

Q1) Which of the following is NOT a reason for subnetting a network?

A) controlling network traffic

B) increasing network security

C) planning for growth

D) making larger groups of computers

Answer: D

Q2) The ____________ command shows current sessions with associated port numbers.

Answer: netstat

netstat -n

Q3) Which of the following addresses is a Class B IP address?

A) 126.14.1.7

B) 224.14.9.11

C) 189.77.101.6

D) 211.55.119.7

Answer: C

Q4) What are the three private IP address ranges and their associated subnet masks?

Answer: 10.0.0.0

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Traffic Signatures

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/43423

Sample Questions

Q1) all ports from 0 to 65,535 are probed one after another

A)back door

B)MTU

C)ping sweep

D)scan throttling

E)packet injection

F)signature

G)vanilla scan

H)RPC

I)FIN packet

J)RST packet

Answer: G

Q2) Which type of scan has the FIN,PSH,and URG flags set?

A) Xmas scan

B) Null scan

C) FIN scan

D) SYN Scan

Answer: A

Q3) A TCP packet with no flags set is referred to as a _________ packet.

Answer: null

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Routing Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43424

Sample Questions

Q1) Define route summarization.

Q2) Which of the following is true about standard IP ACLs?

A) they can filter on source and destination IP address

B) they automatically apply to all active interfaces

C) a 0.0.0.0 inverse mask means all bits are significant

D) they can filter on IP address and port

Q3) a state in which all routers on a network have up-to-date routing tables

A)ACE

B)ARP table

C)banner

D)console port

E)convergence

F)inverse mask

G)metrics

H)routing

I)stub router

j.virtual terminal

Q4) Describe ACLs.

Q5) List the five types of Cisco router passwords.

Q6) Describe antispoofing logging and how you can prevent it with ACLs.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Cryptography

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43425

Sample Questions

Q1) Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?

A) SSH

B) SSL

C) TLS

D) IPsec

Q2) Compare and contrast block cipher with stream cipher.

Q3) The standardization of cryptographic protocols discourages attackers from trying to break them.

A)True

B)False

Q4) Which type of function is used in cryptography?

A) Not AND

B) permutation

C) NOR

D) X-box

Q5) A ______________ value is a fixed-size string representing the original input's contents.

Q6) What is a hash value and how does it verify message integrity?

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Wireless Network Fundamentals

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43426

Sample Questions

Q1) Which of the following is true about RF transmissions?

A) EM radiation is measured in volts

B) frequency has an inverse relationship with wavelength

C) frequency is the distance between waves

D) cooler objects produce higher-frequency radiation than hotter objects

Q2) Cosmic objects emit different types of energy,known as _________________ radiation.

Q3) Which of the following is defined as the maximum departure of a wave from the undisturbed state?

A) amplitude

B) spectrum

C) frequency

D) wavelength

Q4) Describe OFDM.

Q5) Describe two of the three methods of analog modulation.

Q6) The Fresnel zone is the dispersal pattern of waves as they travel from sending to receiving antennas.

A)True

B)False

Q7) Why should you use caution when using multiple APs?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Understanding Wireless Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43427

Sample Questions

Q1) Which of the following is performed by the MAC sublayer?

A) joining the wireless network

B) resolving IP address to MAC address

C) resolving names to IP addresses

D) determining best path

Q2) In which type of attack do attackers intercept the transmissions of two communicating nodes without the user's knowledge?

A) rogue device

B) wardriver

C) man-in-the-middle

D) brute force

Q3) List four issues that a wireless security policy should address.

Q4) Which of the following is true about the SSID?

A) they can be Null

B) they are registered

C) they are not found in beacon frames

D) they are found in control frames

Q5) How is wireless security different than wired security?

Q6) What are the two authentication methods provided by early 802.11 standards?

Q7) Describe 802.1x authentication.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Intrusion Detection and Prevention Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43428

Sample Questions

Q1) __________________ procedures are a set of actions that are spelled out in the security policy and followed if the IDPS detects a true positive.

Q2) Which of the following is NOT a primary detection methodology?

A) signature detection

B) baseline detection

C) anomaly detection

D) stateful protocol analysis

Q3) Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?

A) inline

B) host-based

C) hybrid

D) network-based

Q4) Which of the following is considered a problem with a passive,signature-based system?

A) profile updating

B) signature training

C) custom rules

D) false positives

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Firewalls

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43429

Sample Questions

Q1) What is stateful packet filtering?

Q2) simple filters that determine whether to allow or block packets based on information in protocol headers

A)cleanup rule

B)firewall

C)firewall appliance

D)firewall policy

E)proxy server

F)rule base

G)socket

H)state table

I)stateful packet filters

J)stateless packet filters

Q3) Which of the following is NOT a protocol,port pair that should be filtered when an attempt is made to make a connection from outside the company network?

A) TCP,80

B) TCP,139

C) UDP,138

D) TCP,3389

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Firewall Design and Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43430

Sample Questions

Q1) Describe the process of network address translation.What are the two primary types of NAT?

Q2) What is a reverse firewall and why would you use one?

Q3) In a screened ____________ setup,a router is added between the host and the Internet to carry out IP packet filtering.

Q4) Which of the following is true about a dual-homed host?

A) serves as a single point of entry to the network

B) its main objective is to stop worms and viruses

C) uses a single NIC to manage two network connections

D) it is used as a remote access server in some configurations

Q5) Proxy servers take action based only on IP header information. A)True

B)False

Q6) Reverse firewalls allow all incoming traffic except what the ACLs are configured to deny.

A)True

B)False

Q7) A DMZ is a subnet of _____________ accessible servers placed outside the internal network.

Page 12

Q8) What are the primary and secondary goals of modern proxy servers?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: VPN Concepts

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43431

Sample Questions

Q1) If you use Windows RRAS for your VPN,you will need a third-party RADIUS server if you want to use RADIUS for authentication.

A)True

B)False

Q2) Which of the following is defined as a relationship between two or more entities that describes how they will use the security services to communicate?

A) pairing

B) security association

C) internet key exchange

D) tunnel

Q3) Which of the following is an improvement of TLS over SSL?

A) requires less processing power

B) uses a single hashing algorithm for all the data

C) uses only asymmetric encryption

D) adds a hashed message authentication code

Q4) List two advantages and two disadvantages of VPNs.

Q5) What four events occur when one IPsec-compliant computer connects to another?

Q6) List four standard VPN protocols.

Q7) Briefly describe the L2TP protocol.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Internet and World Wide Web Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43432

Sample Questions

Q1) What is a zone transfer?

A) the movement of e-mail from one domain to another

B) updating a secondary DNS server

C) backing up an SQL data file

D) copying host file data to another system

Q2) SQL injection attacks are isolated to custom applications,so administrators can prevent them.

A)True

B)False

Q3) Which variation on phishing modifies the user's host file to redirect traffic?

A) spear phishing

B) pharming

C) DNS phishing

D) hijacking

Q4) ____________ are networks of zombie computers that magnify the scope and intensity of an attack.

Q5) What are the characteristics of a corporate phishing e-mail? List three of them.

Q6) ___________ direct network traffic to its destination on the Internet using tables and protocols.

Q7) What is a buffer overflow attack?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Security Policy Design and Implementation

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43433

Sample Questions

Q1) Which of the following shows how devices are connected and includes an IP allocation register?

A) hardware inventory

B) topology map

C) asset table

D) security policy

Q2) The people that manage security for the organization should not be same people that conduct risk analysis.

A)True

B)False

Q3) Which of the following would be considered a vulnerability?

A) installation of a firewall

B) antivirus software

C) Internet-connected computer

D) spyware

Q4) What is the purpose of a privileged access policy?

Q5) VPNs create a _____________ to transport information through public communications media.

Q6) What is a server security policy? List at least three areas the policy should address.

Page 15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: On-Going Security Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/43434

Sample Questions

Q1) Discuss the process of IDPS signature evaluation.

Q2) You monitor and evaluate network traffic to gather evidence that indicates whether your IDPS _________________ are working well or need to be updated.

Q3) a system in which an organization's event and security data is funneled to a management console in the main office

A)active defense in depth

B)centralized data collection

C)degaussing

D)distributed data collection

E)independent audit

F)operational audit

G)security event management program

H)social engineering

I)target-to-console ratio

J)Tinkerbell program

Q4) If you determine that a Trojan program has been installed and is initiating a connection to a remote host and you suspect passwords have been compromised,what steps should you take? List three of them.

Q5) Each IDPS has _____________ that gather data passing through the gateway.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.