System Security Ch8

Which high-speed storage network protocols used by a SAN is IP-based?

iSCSI

Which Fibre channel zone is the most restrictive?

FC hard zone

An attacker can use NetBIOS to determine each of the following EXCEPT

list of remote NETBIOS names

Which type of log can provide details regarding requests for specific files on a system?

access log

Which type of device log contains the most beneficial security data?

firewall log

Which type of cloud is offered to all users?

public cloud

Which of these would NOT be a valid internet control message protocol error message

router delay
which means the following are valid internet control message protocol error messages
host unreachable
network unreachable
destination network unknown

Internet control message protocol is used by each of these attacks except

ICMP poisoning
the following are used
smurf DoS attack
ICMP redirect attack
ping of death

Which version of simple network management protocol is considered the most secure?

SNMPv3

Which Damian Name System attack replaces a fraudulent IP address for symbolic name?

DNS poisoning

Which of these is the most secure protocol for transferring files?

SFTP

Each of these is a technique for securing a router except

making all configuration changes remotely
the following:
securing all ports
setting a strong administrator password
using meaningful router name.

which statement about flood guard is true

it prevents DoS or DDoS attacks

Each of these is an entry in a firewall log that should be investigated except

successful logins
the following:
ip address that are being rejected and dropped
suspicious outbound connections
IP addresses that are being rejected and dropped

If a group of users must be separated from other users which is the most secure network design?

Connect them to different switches and routers

Why is loop protection necessary?

it prevents a broadcast storm that can cripple a network

What does MAC limiting and filtering do?

it limits devices that can connect to a switch

in a network using IEEE 802.1x a supplicant

makes a request to the authenticator

Which statement is true regarding security for a computer that boots to apple mac OS x and then runs a windows virtual machine?

the windows virtual machine needs its own security

Which of the following is NOT a security concern of virtualize environments?

virtual servers are less expensive than their physical counterparts.

Which of the following is NOT a medium to connect to an FTP server?

Mapped network drive

Which of the following is a defensive measure used to specifically prevent a DDOS?

Flood Guard

Which technology can prevent DNS poisoning in a DNS namespace?

BIND

Which protocol can be used to perform a Smurf attack?

ICMP

Why will IPv6 eventually replace IPv4?

IPv4 has run out of unique addresses for all the devices on the internet