Security Rules
Authorization
Authentication
Hardening
Switch
100

A network administrator notices that users are unable to access a critical web application from inside the company network, but it is accessible from outside. The administrator suspects a firewall misconfiguration.

What should the network administrator do first to confirm the firewall is the cause?


Disable the web application's security features.

Increase the bandwidth allocated to the web application.

Check the firewall's log files for any deny entries.

Reboot the company's main server

Check the firewall's log files for any deny entries.

100

What does the principle of least privilege entail in the context of PAM?

Providing all users with administrative privileges

Granting users only the rights necessary to perform their job

Allowing users to determine their access rights

Granting users unlimited rights to perform their job

Granting users only the rights necessary to perform their job

100

Which of the following combinations represents two-factor authentication?


Password and the time of login

Password and a user's favorite color

Password and a smart card

Two different passwords

Password and a smart card

100

According to NIST's latest guidance, is requiring multiple character classes for passwords recommended?

Yes, but only for critical systems.

No, it is deprecated.

Yes, it is strongly recommended.

No, but it is optional.

No, it is deprecated.

100

What does "protect mode" do when a switch port enters a violation state?

It reroutes traffic from the invalid source address to a quarantine VLAN.

It encrypts traffic from the invalid source address.

It drops frames from the invalid source address but keeps the interface open.

It disables the port and sends alerts.

It drops frames from the invalid source address but keeps the interface open.

200

What does a non-transparent proxy require from its clients?


No configuration

Configuration with the proxy server address and port number

Only encryption

A special browser

What does a non-transparent proxy require from its clients?

200

In a Role-Based Access Control (RBAC) system, how are permissions typically assigned?


Based on employee tasks performed

Randomly for security purposes

According to the sensitivity of the data

Directly to individual users

Based on employee tasks performed

200

A university is collaborating with several external research institutions to provide a shared research platform. The platform hosts sensitive data and requires secure access control. The university and each of the research institutions have their own identity management systems.

To facilitate secure and seamless access to the shared platform, the university proposes using federated identity management.

What is a critical consideration the university must address to ensure the success of this federated identity management implementation?

The shared platform should be the sole Identity Provider (IdP), and all institutions must migrate their accounts to this platform.

Each institution, including the university, should become a SAML Identity Provider (IdP), and the shared platform should act as a SAML Relying Party (RP).

All participating institutions should abandon their existing identity management systems in favor of a new, unified system.

The university should centralize all user accounts into a single database managed by the university

Each institution, including the university, should become a SAML Identity Provider (IdP), and the shared platform should act as a SAML Relying Party (RP).

200

A network administrator has just installed a new wireless access point for their company. The device came with a default management password.

What should the network administrator do first to ensure the device is secured?

Share the default password with their team for easy management.

Change the default password to something more complex.

Leave the default password as it is for convenience.

Disable the password requirement for easier access.

Change the default password to something more complex.

200

What does "defense in depth" refer to in network security design?

Focusing solely on physical security measures

A single, impenetrable layer of security at the network's edge

Ignoring internal threats and focusing on external attacks

Placing security controls throughout the network


Placing security controls throughout the network

300

What is the primary purpose of deploying a firewall in a network environment?

To filter traffic entering or leaving a network segment

To serve as a primary storage device

To increase the network speed

To manage user access to the internet

To filter traffic entering or leaving a network segment

300

How does RBAC differ from using security groups for assigning permissions?

Security groups encrypt data, while RBAC does not.

RBAC focuses on job roles, while security groups are about user identity.

RBAC assigns permissions directly to users, while security groups do not.

RBAC is discretionary, while security groups are nondiscretionary.

RBAC focuses on job roles, while security groups are about user identity.

300

An employee logs into their computer when they arrive at work and, regardless of what network resources they access throughout the day, they do not have to log in to anything else.

What type of authentication is this?

Windows network sign-in

Single sign-on

Remote sign-in

Windows local sign-in

Single sign-on

300

An IT security specialist is conducting an audit of their company's network devices. The specialist discovers that several unused services, including Telnet and FTP, are enabled on some devices.

What should the IT security specialist do to enhance the security of these devices?

Replace Telnet and FTP with more services of the same security level.

Enable additional services to obscure the unused ones.

Leave the services enabled for potential future use.

Disable the unused services to reduce the attack surface.


Disable the unused services to reduce the attack surface

300

In the context of port security, what is a "sticky MAC"?

A MAC address that is permanently hard-coded into the switch's firmware

A MAC address that is blocked from connecting to any port on the switch

A MAC address that is dynamically learned and stored until the switch is rebooted

A MAC address that can only be used for wireless connections

A MAC address that is dynamically learned and stored until the switch is rebooted

400

Which port is often configured for a non-transparent proxy server to accept client connections?

Port 8080

Port 22

Port 80

Port 443

Port 8080

Port 22

Port 80

Port 443

Port 8080

400

What does role-based access control aim to achieve?

answer

Allow all users equal access.

Reduce the complexity of permissions.

Increase the number of administrators.

Limit permissions based on administrative roles


Limit permissions based on administrative roles

400

What can be included in a digital certificate?


The subject's password

Information about the subject and the issuer

The private key of the subject

A list of authorized users

Information about the subject and the issuer

400

Why should the native VLAN have a different ID than any user-accessible VLAN?

To improve network performance

To mitigate against double tagging attacks

To enable faster VLAN switching

To allow for easier network management

To mitigate against double tagging attacks

400

What is the advantage of stateful firewall rules over stateless rules?

Stateful rules can differentiate between new and established connections.

Stateless rules are easier to configure.

Stateful rules require less processing power.

Stateless rules offer better security.

Stateful rules can differentiate between new and established connections.

500

In the context of IEEE 802.1X, what is the role of a switch configured as a RADIUS client?

To distribute IP addresses

To encrypt network traffic

To forward authentication data

To manage network storage

To forward authentication data

500

What advantage does the reliable delivery offered by TCP provide for TACACS+?


It simplifies the distribution of IP addresses.

It makes it easier to detect when a server is down.

It allows for faster data transmission speeds.

It reduces the need for encryption.


It makes it easier to detect when a server is down.

500

What is the primary purpose of authorization in network systems?


To allocate rights and permissions

To encrypt data

To authenticate user identities

To monitor network traffic

To authenticate user identities

500

What happens if a host attempts to connect with a MAC address that violates the switch's port security policy?

The switch port enters a violation state.

The switch grants temporary access for evaluation.

The switch increases the permitted MAC address limit for that port.

The switch automatically updates its policy to include the new MAC address.

The switch port enters a violation state.

500

Why is it recommended to block LDAP ports from access over the public interface unless hosting a public service?


To prevent unauthorized access.

To improve the speed of LDAP communications.

To reduce the cost of operating an LDAP server.

To comply with digital certificate regulations.

To prevent unauthorized access.