Computer Network Security Assessment & Application Questions Help
Computer Network Security Assessment & Application Questions Help
If you use outside sources to support your answers, provide APA-style citations and a reference page
- Answer one of the following from Section 12.1:
- Which document allows you to effectively monitor the performance of your system?
- Why is it important to conduct a needs assessment?
- In the IT asset lifecycle, in which phase would you applying updates and patches?
- Why should you test a new asset in a sandbox environment?
- What information is needed to create a network diagram?
Answer one of the following from Section 12.2:
- Where can you obtain an MSDS if you didn’t receive one with your shipment?
- What can you do to ensure the safety of employees and visitors?
- What is the difference between a portable and fixed fire suppression systems?
- What are the four components that fire needs to burn?
- In fire suppression, what is the PASS method?
- What is the ideal relative humidity for a room to protect against ESD?
Answer one of the following from Section 12.3:
- What is the difference between a threat and a vulnerability?
- What is a mission critical system?
- What is the difference between a BCP and a BIA?
- Which part of risk response can introduce the possibility of negligence and lead to liability?
- What is the difference between a tangible and an intangible asset?
- What is the difference between quantitative and qualitative analysis?
Answer one of the following from Section 12.4:
- What are the characteristics of a strong password?
- What information should be included into the privacy policy as personally identifiable information?
- What vulnerabilities does a vulnerability scan look for in your network?
- Why should you destroy old versions of the security plan?
- What is the difference between onboarding and off-boarding?
- Which document specifies who is going to do what and when?
Answer one of the following from Section 13.1:
-
- What are some examples of physical security measures you can implement to protect your network?
- Which physical control measure uses mantraps, turnstiles, and double entry doors?
- Who can prevent and react to security breaches?
- Which type of physical security systems establishes controls at each layer to ensure that defeating one level of security does not allow an attacker subsequent access?
- What is the difference between an anti-passback system and photoelectric sensors?
Answer one of the following from Section 13.2:
- What is social engineering? What is the best defense against social engineering?
- What is the difference between Piggybacking and tailgating?
- How can you verify that a website is using HTTPS?
- What is the difference between pretexting and masquerading?
- In which type of social engineering attack does an attacker lie about having authority or use their high status in a company to force victims to provide information?
Answer one of the following from Section 13.3:
- What is the main goal in a Denial of Service (DoS) attack?
- How do DDoS and DRDoS attacks differ?
- What is the difference between a virus and a worm?
- In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations?
- In which type of spoofing are packets intended for the default gateway sent to the attacker instead?
- In which type of session attack does the attacker hijack and use a user’s cookies and uses the cookies?
Answer one of the following from Section 13.4:
- What is a drive-by download?
- What is the difference between MAC flooding and MAC spoofing?
- How does a command injection attack a web application?
- What is the difference between XSS and CSRF/XSRF?
- How does salting the hash protect your network?
- What is the target of ARP spoofing?
- How does a buffer overflow differ from an integer overflow?
Answer one of the following from Section 13.5:
- What is the role of a CA in a PKI?
- What is the subject name within a certificate?
- What does an authentication protocol do?
- How does CHAP protect the password (or shared secret) during the authentication process?
- Which authentication protocol would you choose if you needed to use smart cards?
- What are the two ticket types used with Kerberos? How do tickets make authentication and authorization more efficient?
- What device is required to implement 802.1x authentication?
- What is the difference between a strong and a mutual authentication method?
Answer one of the following from Section 13.6:
- Which protocol is the secure alternative to Telnet?
- What is the difference between SFTP and FTPS?
- Which protocol is added to HTTP for secure Web browsing?
- What improvements does SNMPv3 provide over earlier SNMP versions?
Answer one of the following from Section 13.7:
- How does a remote access VPN differ from a host-to-host VPN?
- With a site-to-site VPN, which devices are configured as the VPN tunnel endpoints?
- What does PPTP use for encryption? What does L2TP use?
- What is the difference between AH and ESP used with IPsec?
- Why are SSL VPNs more likely to be implemented when creating VPNs across the Internet through firewalls that you do not control?
- Answer one of the following from Section 13.8:
- How do you defend against a Ping of Death attack?
- What does the sniffer-detect script with the NMAP utility allow you to do?
- What tools that can help you find backdoors?
- What can you do to prevent your network from becoming an amplifier for DoS attacks?
- What do you need to configure two-factor authentication?
Answer one of the following from Section 14.1:
- What type of recognition method is used by most virus scanning software?
- How does an IPS differ from an IDS?
- What is the advantage to using a network-based IDS instead of a host-based IDS?
- What should you regularly do when using a signature-based IDS?
- How can packet sniffing and port scanning software be used to improve the security of your network?
- Which device(s) can you use to discover open ports?
Answer one of the following from Section 14.2:
- Why should you perform a penetration test on your network?
- Which type of penetration testing provides you with the most accurate results regarding your network’s vulnerabilities?
- How does black box testing differ from grey box testing?
- In which stage of penetration testing do you create a fingerprint of your system?
- What is the difference between operations and electronic penetration testing?
Answer one of the following from Section 14.3:
- How does SecureDynamic differ from SecureSticky?
- How does DAI validate ARP packets on the network?
- What is the difference between enforcement and remediation servers?
- How does an A port violation occur? How can you resolve it?
- What does DHCP snooping do on your network?
Answer one of the following from Section 14.4:
- How does enticement differ from entrapment?
- What is your first step when responding to an incident?
- What information is included in the incident response plan?
- How do you handle any evidence you collect?
- What is the difference between a search warrant and a subpoena?
- In which stage(s) of the evidence life cycle should you be concerned about how the evidence is handled?