Ali Sahar
Quiz by , created more than 1 year ago

information technology

3
0
0
Ali Sahar
Created by Ali Sahar almost 9 years ago
Close

net security q2

Question 1 of 20

1

If you have a web server that needs to be accessible from both your internal network as well as the Internet, the most secure way to do this is to place the server;

Select one of the following:

  • on the internet

  • on your internal network behind a firewall

  • in a DMZ

  • in a dual configuration

Explanation

Question 2 of 20

1

The best way to ensure that a role like DNS is installed on your Windows server using recognized industry practices is to use:

Select one of the following:

  • SCW

  • BPA

  • sconfig

  • winrm

Explanation

Question 3 of 20

1

If you wish to test all your WIndows updates before allowing your clients to install the updates, you should

Select one of the following:

  • Use GPO's to share updates and push them to your clients

  • have your clients download the updates from the Internet

  • Use a WSUS server

  • Use Mac clients, they don't need security updates

Explanation

Question 4 of 20

1

Window's "Core" refers to...

Select one of the following:

  • The main product offerings in the Window's office suite, including Word, Excel, and PowerPoint

  • The Kernel and network configuration of he operating system

  • The parts of the Windows security centre which helps to secure a client machine

  • An installation of Windows Server which has an extremely limited user interface and software installation

Explanation

Question 5 of 20

1

During startup/logon, a Microsoft client will apply policies from different places, effecting how the machine is managed.

What order are these policies applied in?

Select one of the following:

  • OU, Domain, Site, Local

  • Local, Site, Domain, OU

  • Local, Site, OU, Domain

  • Domain, OU, Local, Site

Explanation

Question 6 of 20

1

Fred is logged in as his standard (non-Root) user account. He needs to mount an external drive, fortunately his account is listed in the sudoers file; to run the mount command he can type;

Select one of the following:

  • mount /dev/sda1 /~/usb

  • su -l THEN mount /dev/sda1 /~/usb

  • sudo mount /dev/sda1 /~/usb

  • rootmount /dev/sda1 /~/usb

Explanation

Question 7 of 20

1

In the previous question, assuming fred uses the correct command, and it works as expected, what will the result be?

Select one of the following:

  • The external USB drive will be mounted

  • Fred will be prompted for his password

  • Fred will be prompted for the root password

  • Fred will be informed he cannot perform the action

Explanation

Question 8 of 20

1

You don't need to configure a default gateway to browse Internet websites if you have; *****

Select one of the following:

  • A firewall

  • A proxy server

  • A NAT server

  • You ALWAYS have to have a default gateway to get access of of your network.

Explanation

Question 9 of 20

1

Deploying multiple Honeypots on your network is considered a;

Select one of the following:

  • honeynet

  • beehive

  • honeyfarm

  • masquerade

Explanation

Question 10 of 20

1

What is the advantage of having an IDS system in the DMZ of your network

Select one of the following:

  • It can stop attacks that are occurring against your servers that are hosted there

  • It doesn't slow internal network traffic from reaching the Internet

  • It can lure attacks against your systems away from your actual servers

  • It can log both the types of attacks and where they are originating from against your servers

Explanation

Question 11 of 20

1

To more securely host services that are accessible from the Internet you could;

Select one of the following:

  • Place Internet servers in a screened subnet

  • Place Internet servers behind your Firewall

  • Put your servers in an Intranet

  • Put your servers in a Supernet

Explanation

Question 12 of 20

1

Why would you want to use Direct Access for your remote clients to allow access rather than a Virtual Private Network?

Select one of the following:

  • Direct Access uses Kerberos for authentication, so user credentials are not passed over the Internet

  • Direct Access occurs automatically when a user is not on the internal network, allowing the machine to be updated without user interaction

  • Because Direct Access uses a separate secure tunnel to transmit credentials over the Internet

  • Direct Access uses the PKI of the Active Directory Network, making it more secure than a VPN

Explanation

Question 13 of 20

1

NAT is an example of:

Select one of the following:

  • A stateful firewall

  • IPv4 to IPv6 translation

  • An application firewall

  • An IPSEC concentrator

Explanation

Question 14 of 20

1

In terms of threat assessment, what is a vulnerability?

Select one of the following:

  • An extra gateway onto your network

  • Using Internet Explorer

  • A security weakness that could be exploited by a threat

  • Having low bandwidth and throughput on your gateway

Explanation

Question 15 of 20

1

In Linux, the firewall implements as..

Select one of the following:

  • ipchains

  • natd

  • iptables

  • secured

Explanation

Question 16 of 20

1

On the inside of a properly firewalled network...

Select one of the following:

  • There is no need for a local firewall

  • A local firewall provides depth of defense

  • A local firewall can stop unwanted traffic from compromised internal machines from reaching other machines on the inside

  • Both B and C above

Explanation

Question 17 of 20

1

A way to build a secure server configuration that can be exported to other servers is to;

Select one of the following:

  • Run the BPA

  • Run sconfig

  • run winrm

  • run the SCW

Explanation

Question 18 of 20

1

To build a set of GPO's and policies to secure laptop machines on your network you can use;

Select one of the following:

  • Use the Security Configuration Manager to generate the policies

  • Ghost the laptop with an image

  • Place the laptop in the DMZ

  • make sure the laptop is properly updated

Explanation

Question 19 of 20

1

What is an advantage to installing a Certificate Authority into your Active Directory structure and creating a PKI?

Select one of the following:

  • It will encrypt all the data on your network

  • It stops the use of Kerberos authentication which is not very secure

  • It allows you to browse non-trusted web sites on the Internet securely

  • It can allow for trusted connection to Domains and computers outside your Domain

Explanation

Question 20 of 20

1

What is one of the security challenges of using imaging to setup your systems on the network?

Select one of the following:

  • Images can be modified while getting pushed out to target machines

  • Systems are not updated properly

  • Administrative accounts have the same password on all machine

  • Base images can have rootkits installed into them

Explanation