SEC Technologies And Tools - Cyber SECurity Quiz

78 Questions | Total Attempts: 54

SettingsSettingsSettings
Please wait...
SEC Technologies And Tools - Cyber SECurity Quiz

As an innovative company, SEC Technologies is continuously working on game-changing solutions to protect government agencies, organizations and companies of all sizes and industries against the increasing number of cyber-attacks. This is a Cyber Security Quiz about SEC Technologies and Tools!


Questions and Answers
  • 1. 
    Your network uses an authentication service base on X.500 specification. When encrypted, it uses TLS. Which authentication service is your network using?
    • A. 

      (A) SAML

    • B. 

      (B) Diameter

    • C. 

      (C) Kerberos

    • D. 

      (D) LDAP

  • 2. 
    You are tasked with configuring a switch so that it separates VoIP and data traffic. Which of the following provides the BEST solution?
    • A. 

      (A) NAC

    • B. 

      (B) DMZ

    • C. 

      (C) SRTP

    • D. 

      (D) VLAN

  • 3. 
    A HIDS reported a vulnerability on a system based on a known attack. After researching the alert from the HIDS, you identify the recommended solution and begin applying it. What type of HIDS is in use?
    • A. 

      (A) Network-based 

    • B. 

      (B) Signature-based

    • C. 

      (C) Heuristic-based

    • D. 

      (D) Anomaly-based

  • 4. 
    You manage a Linux computer used for security within your network. You plan to use it to inspect and handle network-based traffic using iptables. Which of the following network devices can this replace?
    • A. 

      (A) Wireless access point

    • B. 

      (B) Firewall

    • C. 

      (C) Layer 2 switch

    • D. 

      (D) Bridge

  • 5. 
    Lisa is enabling NTP on some servers within the DMZ. Which of the following use cases is she MOST likely supporting with this action?
    • A. 

      (A) Support voice and video transmissions

    • B. 

      (B) Provide time synchronization

    • C. 

      (C) Enable email usage

    • D. 

      (D) Encrypt data-in-transit

  • 6. 
    Your network includes dozens of servers. Administrators in your organization are having problems aggregating and correlating the logs from these services. Which of the following provides the BEST solution for these problems?
    • A. 

      (A) SIEM

    • B. 

      (B) Network mapper

    • C. 

      (C) Network scanner

    • D. 

      (D) Nmap

  • 7. 
    You need to perform tests on your network to identify missing security controls. However, you want to have the least impact on your systems that users are accessing. Which of the following tools is the BEST to meet this need?
    • A. 

      (A) A syn stealth scan

    • B. 

      (B) Vulnerability scan

    • C. 

      (C) Ping scan

    • D. 

      (D) Penetration test

  • 8. 
    Lisa wants to manage and monitor the switches and routers in her network. Which of the following protocols would she use?
    • A. 

      (A) NAT

    • B. 

      (B) SRTP

    • C. 

      (C) SNMPv3

    • D. 

      (D) DNSSEC

  • 9. 
    Your organization hosts several web servers in a web farm. They have recently been attacked, resulting in unacceptable downtime. Management wants to implement a solution that will provide protection for the web farm and include load balancing to improve the overall performance of the farm. Which of the following BEST meet this need?
    • A. 

      (A) Stateless firewall

    • B. 

      (B) Stateful firewall

    • C. 

      (C) Web application firewall

    • D. 

      (D) Host-based firewall

  • 10. 
    You need to send several large files containing proprietary data to a business partner. Which of the following is the BEST choice for this task?
    • A. 

      (A) FTP

    • B. 

      (B) SNMPv3

    • C. 

      (C) SFTP

    • D. 

      (D) SRTP

  • 11. 
    You need to configure a UTM security appliance to restrict traffic going to social media sites. Which of the following are you MOST likely to configure?
    • A. 

      (A) Content inspection

    • B. 

      (B) Malware inspection

    • C. 

      (C) URL filter

    • D. 

      (D) DDos mitigator

  • 12. 
    You need to implement anti-spoofing on a border router. Which one of the following choices will BEST meet this goal?
    • A. 

      (A) Create rules to block all outgoing traffic from a private IP address.

    • B. 

      (B) Implement a flood guard on switches.

    • C. 

      (C) Add a web application firewall.

    • D. 

      (D) Create rules to block all incoming traffic from a private IP address.

  • 13. 
    Your organization is planning to deploy a new e-commerce web site. Management anticipates heavy processing requirements for a back-end application. The current design will use one web server and multiple application servers. Which of the following BEST describes the application servers?
    • A. 

      (A) Load balancing

    • B. 

      (B) Clustering

    • C. 

      (C) RAID

    • D. 

      (D) Affinity scheduling

  • 14. 
    After recently adding additional network devices, administrators noticed an increased workload related to their IDS. Which of the following can cause an increased workload from incorrect reporting?
    • A. 

      (A) False negatives

    • B. 

      (B) False positives

    • C. 

      (C) Signature-based

    • D. 

      (D) Behavioral-based IDS

  • 15. 
    Your organization is planning to establish a secure link between one of your mail servers and a business partner's mail server. The connection will use the Internet. Which protocol is the BEST choice?
    • A. 

      (A) TLS

    • B. 

      (B) SMTP

    • C. 

      (C) HTTP

    • D. 

      (D) SSH

  • 16. 
    Lisa oversees and monitors processes at a water treatment plant using SCADA systems. Administrators recently discovered malware on her system that was connecting to the SCADA systems. Although they removed the malware, management is still concerned. Lisa needs to continue using her system and it's not possible to update the SCADA systems. Which of the following can mitigate this risk?
    • A. 

      (A) Install HIPS on the SCADA systems

    • B. 

      (B) Install a firewall on the border of the SCADA network.

    • C. 

      (C) Install a NIPS on the border of the SCADA network

    • D. 

      (D) Install a honeypot on the SCADA network

  • 17. 
    You suspect someone has been trying a brute force password attack on a Linux system. Which of the following logs should you check to view failed authentication attempts by users?
    • A. 

      (A) /var/log/btmp

    • B. 

      (B) /var/log/fail

    • C. 

      (C) var/log/httpd

    • D. 

      (D) /var/log/kern

  • 18. 
    Flancrest Enterprises recently set up a web site utilizing several web servers in a web farm. The web servers access a back-end database. The database is hosted by a database application configured on two database servers. Web servers can access either of the database servers. Which of the following BEST describes the configuration of the database servers?
    • A. 

      (A) Active-passive

    • B. 

      (B) Round-robin

    • C. 

      (C) Affinity

    • D. 

      (D) Active-active

  • 19. 
    You need to modify the network infrastructure to increase availability of web-based applications for Internet clients. Which of the following choices provides the BEST solution?
    • A. 

      (A) Load balancing

    • B. 

      (B) Proxy server

    • C. 

      (C) UTM

    • D. 

      (D) Content inspection

  • 20. 
    You have configured a firewall in your network to block ICMP traffic. You want to verify that it is blocking this traffic. Which of the following commands would you use? 
    • A. 

      (A) arp

    • B. 

      (B) ipconfig

    • C. 

      (C) netstat

    • D. 

      (D) ping

  • 21. 
    A penetration tester is running several tests on a server within your organization's DMZ. The tester wants to identify the operating system of the remote host. Which of the following tools or methods are MOST likely to provide this information?
    • A. 

      (A) Banner grabbing

    • B. 

      (B) Vulnerability scan

    • C. 

      (C) password cracker

    • D. 

      (D) Protocol analyzer

  • 22. 
    Your organization wants to increase security for VoIP and video teleconferencing applications used within the network. Which of the following protocols will BEST support this goal?
    • A. 

      (A) SMTP

    • B. 

      (B) TLS

    • C. 

      (C) SFTP

    • D. 

      (D) SRTP

  • 23. 
    Management within your organization wants to ensure that switches are not susceptible to switching loop problems. Which of the following protocols is the BEST choice to meet this need?
    • A. 

      (A) Flood guard

    • B. 

      (B) SNMPv3

    • C. 

      (C) SRTP

    • D. 

      (D) RSTP

  • 24. 
    Your organization hosts an e-commerce business that has become quite successful recently. It includes a web farm and a database server within the DMZ. IT management is concerned that there isn't enough staff working around the clock to protect these servers. Which of the following would provide the BEST automated protection for these servers?
    • A. 

      (A) NIDS and HIDS

    • B. 

      (B) NIPS and HIPS

    • C. 

      (C) SIEM and NIPS

    • D. 

      (D) SIEM and NIDS

  • 25. 
    Attackers have recently launched several attacks against servers in your organization's DMZ. You are tasked with identifying a solution that will have the best chance at preventing these attacks in the future. Which of the following is the BEST choice? 
    • A. 

      (A) An out-of-band IPS

    • B. 

      (B) An in-band IPS

    • C. 

      (C) A passive IDS

    • D. 

      (D) An out-of-band IDS

Back to Top Back to top