Tyler Hampton
Test por , creado hace más de 1 año

Implement security configuration parameters on network devices and other technologies.

12
0
0
Tyler Hampton
Creado por Tyler Hampton hace alrededor de 6 años
Cerrar

S+ Objective 1.1 Quiz

Pregunta 1 de 14

1

Which of the following devices is the most capable of providing infrastructure security?

Selecciona una de las siguientes respuestas posibles:

  • Hub

  • Switch

  • Router

  • Modem

Explicación

Pregunta 2 de 14

1

Upper management has decreed that a firewall must be put in place immediately, before your site suffers an attack similar to one that struck a sister company. Responding to this order, your boss instructs you to implement a packet filter by the end of the week. A packet filter performs what function?

Selecciona una de las siguientes respuestas posibles:

  • Prevents unauthorized packets from entering the network.

  • Allows all packets to leave the network.

  • Allows all packets to enter the network

  • Eliminates collisions in the network

Explicación

Pregunta 3 de 14

1

Which device stores information about destinations in a network (choose the best answer)

Selecciona una de las siguientes respuestas posibles:

  • Hub

  • Modem

  • Firewall

  • Router

Explicación

Pregunta 4 de 14

1

As more and more clients have been added to your network, the efficiency of the network has decreased significantly. You're preparing a budget for next year, and you specifically want to address this problem. Which of the following devices acts primarily as a tool to improve network efficiency?

Selecciona una de las siguientes respuestas posibles:

  • Hub

  • Switch

  • Router

  • PBX

Explicación

Pregunta 5 de 14

1

Which of the following can be implemented as a software or hardware solution and is usually associated with a device - a router, a firewall, NAT, and so on - used to shift a load from one device to another?

Selecciona una de las siguientes respuestas posibles:

  • Proxy

  • Hub

  • Load Balancer

  • Switch

Explicación

Pregunta 6 de 14

1

Which of the following are multiport devices that improve network efficiency?

Selecciona una de las siguientes respuestas posibles:

  • Switches

  • Modems

  • Gateways

  • Concentrators

Explicación

Pregunta 7 de 14

1

Your organization wants to prevent users from accessing file sharing web sites. Which of the following choices will meet this need?

Selecciona una de las siguientes respuestas posibles:

  • Content Inspection

  • Malware Inspection

  • URL Filter

  • Web Application Firewall

Explicación

Pregunta 8 de 14

1

Your organization wants to combine some of the security controls used on the network. What could your organization implement to meet this goal?

Selecciona una de las siguientes respuestas posibles:

  • SSO

  • UTM

  • VPN

  • VLAN

Explicación

Pregunta 9 de 14

1

Which of the following operates on the HIGHEST layer of the OSI model, and is the most effective at blocking application attacks?

Selecciona una de las siguientes respuestas posibles:

  • IDS

  • Router

  • WAF

  • Stateless Firewall

Explicación

Pregunta 10 de 14

1

Which of the following network tools includes sniffing capabilities?

Selecciona una de las siguientes respuestas posibles:

  • IDS

  • WAP

  • VPN

  • NAC

Explicación

Pregunta 11 de 14

1

A HIDS reported a vulnerability on a system using an assigned vulnerability identification number. After researching the number on the vendor's web site, you identify the recommended solution and begin applying it. What type of HIDS is in use?

Selecciona una de las siguientes respuestas posibles:

  • Network-based

  • Heuristic-based

  • Signature-based

  • Anomaly-based

Explicación

Pregunta 12 de 14

1

Management is concerned about malicious activity on your network and wants to implement a security control that will detect unusual traffic on the network. Which of the following is the BEST choice to meet this goal?

Selecciona una de las siguientes respuestas posibles:

  • Network firewall

  • Signature-based IDS

  • Anomaly-based IDS

  • Honeypot

Explicación

Pregunta 13 de 14

1

Your network IDS recently detected an attack on a server. Upon investigation, you discover that the IDS does not have a signature on this attack. Instead, the IDS detected it using a heuristic analysis. Of the following choices, what is the MOST likely category of this attack?

Selecciona una de las siguientes respuestas posibles:

  • Definition

  • CVE

  • Zero-day

  • Phishing

Explicación

Pregunta 14 de 14

1

You are preparing to deploy an anomaly-based detection system to monitor network activity. Which of the following would you create first?

Selecciona una de las siguientes respuestas posibles:

  • Flood guards

  • Signatures

  • Baseline

  • Honeypot

Explicación