A network administrator notices that users are unable to access a critical web application from inside the company network, but it is accessible from outside. The administrator suspects a firewall misconfiguration.
What should the network administrator do first to confirm the firewall is the cause?
Disable the web application's security features.
Increase the bandwidth allocated to the web application.
Check the firewall's log files for any deny entries.
Reboot the company's main server
Check the firewall's log files for any deny entries.
What does the principle of least privilege entail in the context of PAM?
Providing all users with administrative privileges
Granting users only the rights necessary to perform their job
Allowing users to determine their access rights
Granting users unlimited rights to perform their job
Granting users only the rights necessary to perform their job
Which of the following combinations represents two-factor authentication?
Password and the time of login
Password and a user's favorite color
Password and a smart card
Two different passwords
Password and a smart card
According to NIST's latest guidance, is requiring multiple character classes for passwords recommended?
Yes, but only for critical systems.
No, it is deprecated.
Yes, it is strongly recommended.
No, but it is optional.
No, it is deprecated.
What does "protect mode" do when a switch port enters a violation state?
It reroutes traffic from the invalid source address to a quarantine VLAN.
It encrypts traffic from the invalid source address.
It drops frames from the invalid source address but keeps the interface open.
It disables the port and sends alerts.
It drops frames from the invalid source address but keeps the interface open.
What does a non-transparent proxy require from its clients?
No configuration
Configuration with the proxy server address and port number
Only encryption
A special browser
What does a non-transparent proxy require from its clients?
In a Role-Based Access Control (RBAC) system, how are permissions typically assigned?
Based on employee tasks performed
Randomly for security purposes
According to the sensitivity of the data
Directly to individual users
Based on employee tasks performed
A university is collaborating with several external research institutions to provide a shared research platform. The platform hosts sensitive data and requires secure access control. The university and each of the research institutions have their own identity management systems.
To facilitate secure and seamless access to the shared platform, the university proposes using federated identity management.
What is a critical consideration the university must address to ensure the success of this federated identity management implementation?
The shared platform should be the sole Identity Provider (IdP), and all institutions must migrate their accounts to this platform.
Each institution, including the university, should become a SAML Identity Provider (IdP), and the shared platform should act as a SAML Relying Party (RP).
All participating institutions should abandon their existing identity management systems in favor of a new, unified system.
The university should centralize all user accounts into a single database managed by the university
Each institution, including the university, should become a SAML Identity Provider (IdP), and the shared platform should act as a SAML Relying Party (RP).
A network administrator has just installed a new wireless access point for their company. The device came with a default management password.
What should the network administrator do first to ensure the device is secured?
Share the default password with their team for easy management.
Change the default password to something more complex.
Leave the default password as it is for convenience.
Disable the password requirement for easier access.
Change the default password to something more complex.
What does "defense in depth" refer to in network security design?
Focusing solely on physical security measures
A single, impenetrable layer of security at the network's edge
Ignoring internal threats and focusing on external attacks
Placing security controls throughout the network
Placing security controls throughout the network
What is the primary purpose of deploying a firewall in a network environment?
To filter traffic entering or leaving a network segment
To serve as a primary storage device
To increase the network speed
To manage user access to the internet
To filter traffic entering or leaving a network segment
How does RBAC differ from using security groups for assigning permissions?
Security groups encrypt data, while RBAC does not.
RBAC focuses on job roles, while security groups are about user identity.
RBAC assigns permissions directly to users, while security groups do not.
RBAC is discretionary, while security groups are nondiscretionary.
RBAC focuses on job roles, while security groups are about user identity.
An employee logs into their computer when they arrive at work and, regardless of what network resources they access throughout the day, they do not have to log in to anything else.
What type of authentication is this?
Windows network sign-in
Single sign-on
Remote sign-in
Windows local sign-in
Single sign-on
An IT security specialist is conducting an audit of their company's network devices. The specialist discovers that several unused services, including Telnet and FTP, are enabled on some devices.
What should the IT security specialist do to enhance the security of these devices?
Replace Telnet and FTP with more services of the same security level.
Enable additional services to obscure the unused ones.
Leave the services enabled for potential future use.
Disable the unused services to reduce the attack surface.
Disable the unused services to reduce the attack surface
In the context of port security, what is a "sticky MAC"?
A MAC address that is permanently hard-coded into the switch's firmware
A MAC address that is blocked from connecting to any port on the switch
A MAC address that is dynamically learned and stored until the switch is rebooted
A MAC address that can only be used for wireless connections
A MAC address that is dynamically learned and stored until the switch is rebooted
Which port is often configured for a non-transparent proxy server to accept client connections?
Port 8080
Port 22
Port 80
Port 443
Port 8080
Port 22
Port 80
Port 443
Port 8080
What does role-based access control aim to achieve?
answer
Allow all users equal access.
Reduce the complexity of permissions.
Increase the number of administrators.
Limit permissions based on administrative roles
Limit permissions based on administrative roles
What can be included in a digital certificate?
The subject's password
Information about the subject and the issuer
The private key of the subject
A list of authorized users
Information about the subject and the issuer
Why should the native VLAN have a different ID than any user-accessible VLAN?
To improve network performance
To mitigate against double tagging attacks
To enable faster VLAN switching
To allow for easier network management
To mitigate against double tagging attacks
What is the advantage of stateful firewall rules over stateless rules?
Stateful rules can differentiate between new and established connections.
Stateless rules are easier to configure.
Stateful rules require less processing power.
Stateless rules offer better security.
Stateful rules can differentiate between new and established connections.
In the context of IEEE 802.1X, what is the role of a switch configured as a RADIUS client?
To distribute IP addresses
To encrypt network traffic
To forward authentication data
To manage network storage
To forward authentication data
What advantage does the reliable delivery offered by TCP provide for TACACS+?
It simplifies the distribution of IP addresses.
It makes it easier to detect when a server is down.
It allows for faster data transmission speeds.
It reduces the need for encryption.
It makes it easier to detect when a server is down.
What is the primary purpose of authorization in network systems?
To allocate rights and permissions
To encrypt data
To authenticate user identities
To monitor network traffic
To authenticate user identities
What happens if a host attempts to connect with a MAC address that violates the switch's port security policy?
The switch port enters a violation state.
The switch grants temporary access for evaluation.
The switch increases the permitted MAC address limit for that port.
The switch automatically updates its policy to include the new MAC address.
The switch port enters a violation state.
Why is it recommended to block LDAP ports from access over the public interface unless hosting a public service?
To prevent unauthorized access.
To improve the speed of LDAP communications.
To reduce the cost of operating an LDAP server.
To comply with digital certificate regulations.
To prevent unauthorized access.