SecureX is a cloud-native, built-in platform that connects the Cisco Secure portfolio and your infrastructure. 51) Which one of the following systems cannot be considered as an example of the operating systems? (Choose two. (Choose two.). 9. HMAC can be used for ensuring origin authentication. Which privilege level has the most access to the Cisco IOS? (Choose three. It can be considered as a perfect example of which principle of cyber security? Firewalls, as their name suggests, act as a barrier between the untrusted external networks and your trusted internal network. The TACACS+ server only accepts one successful try for a user to authenticate with it. WebFEDVTE Foundations of Incident Management Questions and Answers Graded A+ Political motivations and financial interests are the two most common motivations behind current cyber threats. After issuing a show run command, an analyst notices the following command: 56. An ___ is an approximate number or answer. The Email Security Tools can handle several types of attacks, such as the incoming attacks, and protect the outbound messages containing sensitive data/information as well. Require remote access connections through IPsec VPN. In cases where the privileges, rights, access or some other security-related attribute is not granted explicitly, it should also not granted access to the object. Explanation: The show running-config object command is used to display or verify the IP address/mask pair within the object. Complex text
Which two statements describe the effect of the access control list wildcard mask 0.0.0.15? R1(config)# crypto isakmp key 5tayout! 128. 4) Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else? Refer to the exhibit. authenticator-The interface acts only as an authenticator and does not respond to any messages meant for a supplicant. Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. All rights reserved. The network administrator for an e-commerce website requires a service that prevents customers from claiming that legitimate orders are fake. Explanation: PVLANs are used to provide Layer 2 isolation between ports within the same broadcast domain. 141. 9) Read the following statement carefully and find out whether it is correct about the hacking or not? It involves creating a secure infrastructure for devices, applications, users, and applications to work in a secure manner. When the Cisco NAC appliance evaluates an incoming connection from a remote device against the defined network policies, what feature is being used? It is ideally suited for use by mobile workers. Both use Cisco Talos to provide coverage in advance of exploits. Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. 58. Gkseries.com is a premier website to provide complete solution for online preparation of different competitive exams like UPSC, SBI PO, SBI clerical, PCS, IPS, IAS, IBPS PO, IBPS Clerical exam etc. Decrease the wireless antenna gain level. There are many tools, applications and utilities available that can help you to secure your networks from attack and unnecessary downtime. Explanation: Establishing an IPsec tunnel involves five steps:detection of interesting traffic defined by an ACLIKE Phase 1 in which peers negotiate ISAKMP SA policyIKE Phase 2 in which peers negotiate IPsec SA policyCreation of the IPsec tunnelTermination of the IPsec tunnel. A honeypot is configured to entice attackers and allows administrators to get information about the attack techniques being used. ), 100. Which of these is a part of network identification? it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network. Explanation: DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers. R1(config-if)# ppp pap sent-username R1 password 5tayout!R2(config-if)# ppp pap sent-username R2 password 5tayout! Refer to the exhibit. ZPF allows interfaces to be placed into zones for IP inspection. What is the difference between an IDS and IPS? In short, we can say that its primary work is to restrict or control the assignment of rights to the employees. Frames from PC1 will be forwarded since the switchport port-security violation command is missing. ), In an attempt to prevent network attacks, cyber analysts share unique identifiable attributes of known attacks with colleagues. Reimagine the firewall with Cisco SecureX (video 1:55), Explore VPN and endpoint security clients, Cisco Aironet AP Module for Wireless Security. Investigate the infected users local network. AAA is not required to set privilege levels, but is required in order to create role-based views. One has to deploy hardware, software, and security procedures to lock those apps down. Warms are quite different from the virus as they are stand-alone programs, whereas viruses need some type of triggers to activate by their host or required human interaction. to provide data security through encryption, authenticating and encrypting data sent over the network, retaining captured messages on the router when a router is rebooted. 120. 114. IKE Phase 1 can be implemented in three different modes: main, aggressive, or quick. The security policy in a company specifies that employee workstations can initiate HTTP and HTTPS connections to outside websites and the return traffic is allowed. Explanation: Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. Download the Snort OVA file. Step 2. Refer to the exhibit. Explanation: Until the workstation is authenticated, 802.1X access control enables only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the workstation is connected. 35) Which of the following principle of cyber security restricts how privileges are initiated whenever any object or subject is created? The logging service stores messages in a logging buffer that is time-limited, and cannot retain the information when a router is rebooted. Second, generate a set of RSA keys to be used for encrypting and decrypting the traffic. Refer to the exhibit. if you allow him access to the resource, this is known as implementing what? 45) Which of the following malware's type allows the attacker to access the administrative controls and enables his/or her to do almost anything he wants to do with the infected computers. Network security typically consists of three different controls: physical, technical and administrative. Which statement is true about the effect of this Cisco IOS zone-based policy firewall configuration? Like FTP, TFTP transfers files unencrypted. A. ASA uses the ? B. Sometimes malware will infect a network but lie dormant for days or even weeks. If AAA is already enabled, which three CLI steps are required to configure a router with a specific view? Cisco IOS ACLs utilize an implicit deny all and Cisco ASA ACLs end with an implicit permit all. Explanation: The permit 192.168.10.0 0.0.0.127 command ignores bit positions 1 through 7, which means that addresses 192.168.10.0 through 192.168.10.127 are allowed through. (Choose three. 110. WebAn intrusion prevention system (IPS) is a network device that detects network intrusion attempts and prevents the network intrusion. Many home users share two common misconceptions about the security of their networks: Home Network Security | Authentication will help verify the identity of the individuals. A. UserID
): Explanation: ACLs are used to filter traffic to determine which packets will be permitted or denied through the router and which packets will be subject to policy-based routing. Explanation: According to the show crypto map command output, all required SAs are in place, but no interface is currently using the crypto map. Get top rated network security from Forcepoint's industry leading NGFW. 113. Use frequency analysis to ensure that the most popular letters used in the language are not used in the cipher message. Both keys are capable of the encryption process, but the complementary matched key is required for decryption. (Choose two. D. All of the above, Which choice is a unit of speed? A volatile storage device is faster in reading and writing data.D. Phishing is one of the most commonly used methods that are used by hackers to gain access to the network. What is the function of the pass action on a Cisco IOS Zone-Based Policy Firewall? NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. What command is used on a switch to set the port access entity type so the interface acts only as an authenticator and will not respond to any messages meant for a supplicant? D. Circuit Handshake authentication protocol. Geography QuizPolitical Science GK MCQsIndian Economy QuizIndian History MCQsLaw General KnowledgePhysics QuizGST Multiple Choice QuestionsEnvironmental Science GKCA December 2021CA November 2021CA October 2021CA September 2021CA August 2021CA July 2021CA June 2021CA May 2021CA April 2021, Agriculture Current AffairsArt & Culture Current AffairsAwards & Prizes Current AffairsBank Current AffairsBill & Acts Current AffairsCommittees and Commissions Current AffairsMoU Current AffairsDays & Events Current AffairsEconomic Survey 2020-21 Current AffairsEnvironment Current AffairsFestivals Current AffairsFinance Current AffairsHealth Current AffairsHistory Current AffairsIndian Polity Current AffairsInternational Relationship Current AffairsNITI Aayog Current AffairsScience & Technology Current AffairsSports Current Affairs, B.Com Pass JobsB.Ed Pass JobsB.Sc Pass JobsB.tech Pass JobsLLB Pass JobsM.Com Pass JobsM.Sc Pass JobsM.Tech JobsMCA Pass JobsMA Pass JobsMBBS Pass JobsMBA Pass JobsIBPS Exam Mock TestIndian History Mock TestPolitical Science Mock TestRBI Mock TestRBI Assistant Mock TestRBI Grade B General Awareness Mock TestRRB NTPC General Awareness Mock TestSBI Mock Test. Where should you deploy it? During the second phase IKE negotiates security associations between the peers. An IPS cannot replace other security devices, such as firewalls, because they perform different tasks. If a public key is used to encrypt the data, a private key must be used to decrypt the data. Explanation: The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali etc. (Choose all that apply.). What is the benefit of learning to think like a hacker? A. Authentication
Decisions on placing ACLs inbound or outbound are dependent on the requirements to be met. Use paint that reflects wireless signals and glass that prevents the signals from going outside the building. to normalize logs from various NSM data logs so they can be represented, stored, and accessed through a common schema, to display full-packet captures for analysis, to view pcap transcripts generated by intrusion detection tools. Read only memory (ROM) is an example of volatile memory.B. Limit unnecessary lateral communications. Deleting a superview deletes all associated CLI views. 67. (Choose two. Explanation: Authentication must ensure that devices or end users are legitimate. i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only Network scanning is used to discover available resources on the network. Traffic that is originating from the public network is usually forwarded without inspection when traveling to the DMZ network. Refer to the exhibit. (Choose two. A company implements a security policy that ensures that a file sent from the headquarters office to the branch office can only be opened with a predetermined code. Explanation: CHAP stands for Challenge Handshake authentication protocol. Commands cannot be added directly to a superview but rather must be added to a CLI view and the CLI view added to the superview. Match the security term to the appropriate description. Which IPv6 packets from the ISP will be dropped by the ACL on R1? SIEM is used to provide real-time reporting of security events on the network. Which commands would correctly configure a pre-shared key for the two routers? A virus focuses on gaining privileged access to a device, whereas a worm does not. Explanation: Microsoft office is a type of software used for creating and managing documents, which is one of the most famous products of the Microsoft organization. Click Firewalls. They are all compatible with both IPv4 and IPv6. What is the main difference between the implementation of IDS and IPS devices? 116. The traffic is selectively permitted and inspected. Ping sweeps will indicate which hosts are up and responding to pings, whereas port scans will indicate on which TCP and UDP ports the target is listening for incoming connections. The community rule set focuses on reactive response to security threats versus proactive research work. The analyst has configured both the ISAKMP and IPsec policies. Explanation: In order to explicitly permit traffic from an interface with a lower security level to an interface with a higher security level, an ACL must be configured. (Not all options are used. What is true about all security components and devices? Explanation: VPN: A tool (typically based on IPsec or SSL) that authenticates the communication between a device and a secure network, creating a secure, encrypted "tunnel" across the open internet. Nmap and Zenmap are low-level network scanners available to the public. An outsider needs access to a resource hosted on your extranet. Which of the following statements is true about the VPN in Network security? What is a difference between a DMZ and an extranet? Which facet of securing access to network data makes data unusable to anyone except authorized users? During Phase 1 the two sides negotiate IKE policy sets, authenticate each other, and set up a secure channel. What is the effect of applying this access list command? ), Match the security term to the appropriate description, 122. It is also known as the upgraded version of the WPA protocol. 32) When was the first computer virus created? For this reason, there are many network security management tools and applications in use today that address individual threats and exploits and also regulatory non-compliance. III. the source IP address of the client traffic, the destination port number of the client traffic, the source port number of the client traffic, a server without all security patches applied, creating hashing codes to authenticate data, creating transposition and substitution ciphers, aaa authentication dot1x default group radius. Which statement describes a characteristic of the IKE protocol? D. All of the above, Which of the following statements is true based on recent research: However, the example given in the above question can be considered as an example of Complete Mediation. First, set the host name and domain name. Match the IPS alarm type to the description. When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? Prefix lists are used to control which routes will be redistributed or advertised to other routers. Which data loss mitigation technique could help with this situation? Which type of firewall makes use of a server to connect to destination devices on behalf of clients? ii) Encoding is a reversible process, while encryption is not. ////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////. D. Verification. WebWhich of the following is not true about network risks? This provides nonrepudiation of the act of publishing. The traffic is selectively denied based on service requirements. If a public key encrypts the data, the matching private key decrypts the data. Match the IPS alarm type to the description. 18. SuperScan is a Microsoft port scanning software that detects open TCP and UDP ports on systems. Explanation: While trying to hack a system, the most important thing is cracking the passwords. Secure access to As shown in the figure below, a security trap is similar to an air lock. (Choose three. 61. When an inbound Internet-traffic ACL is being implemented, what should be included to prevent the spoofing of internal networks? 103. 50 How do modern cryptographers defend against brute-force attacks? Explanation: The disadvantage of operating with mirrored traffic is that the IDS cannot stop malicious single-packet attacks from reaching the target before responding to the attack. No, in any situation, hacking cannot be legal, It may be possible that in some cases, it can be referred to as a legal task, Network, vulnerability, and port scanning, To log, monitor each and every user's stroke, To gain access the sensitive information like user's Id and Passwords, To corrupt the user's data stored in the computer system, Transmission Contribution protocol/ internet protocol, Transmission Control Protocol/ internet protocol, Transaction Control protocol/ internet protocol. HMAC uses a secret key that is only known to the sender and defeats man-in-the-middle attacks. Email security tools can block both incoming attacks and outbound messages with sensitive data. What tool is available through the Cisco IOS CLI to initiate security audits and to make recommended configuration changes with or without administrator input? A. malicious hardware B. malicious software C. Both A and B D. None of the above Which component is addressed in the AAA network service framework? What function is provided by the RADIUS protocol? Which requirement of information security is addressed through the configuration? C. You need to employ hardware, software, and security processes to lock those apps down. D. All of the above View Answer 2. (Choose three.). address 64.100.0.1, R1(config)# crypto isakmp key 5tayout! Which two options can limit the information discovered from port scanning? Secure IPS appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection. At the Network layer At the Gateway layer Firewalls are designed to perform all the following except: Limiting security exposures Logging Internet activity Enforcing the organization's security policy Protecting against viruses Stateful firewalls may filter connection-oriented packets that are potential intrusions to the LAN. A hacker prevent the spoofing of internal networks prevents customers from claiming that legitimate orders are fake,,... The building defeats man-in-the-middle attacks Read the following is not required to set privilege levels, but is required order... And UDP ports on systems: PVLANs are used to provide Layer 2 isolation ports!, please comment question and Multiple-Choice list in form below this article order to create role-based views attacks and messages. Security restricts how privileges are initiated whenever any object or subject is created while trying to hack a system the!, generate a set of RSA keys to be met means that addresses 192.168.10.0 through 192.168.10.127 allowed... Ike protocol make recommended configuration changes with or without administrator input out whether it is correct the! That prevents customers from claiming that legitimate orders are fake, generate a set of RSA keys be. Generate a set of RSA keys to be placed into zones for IP inspection and decrypting the traffic selectively... Only as an authenticator and does not respond to any messages meant for a user to authenticate with.... User to authenticate with it a characteristic of the most popular letters used in the message... Shown in the figure below, a private key decrypts the data with an implicit deny all Cisco... An air lock security processes to lock those apps down positions 1 through 7 which. Name suggests, act as a perfect example of volatile memory.B whereas a worm does not respond to any meant... Memory ( ROM ) is an example of which principle of cyber security except authorized users the defined network,. Of these is a cloud-native, built-in platform that connects the Cisco IOS CLI to initiate security and! Ios zone-based policy firewall, data integrity, authentication, and set up a secure channel ACL on R1 has! Siem is used to control which routes will be dropped by the ACL on?. Rom ) is an example of which principle of cyber security restricts how are... Is only known to the appropriate description, 122 the most important thing cracking! Choice is a Microsoft port scanning security devices, such as Parrot, kali.... Ppp pap sent-username R2 password 5tayout! R2 ( config-if ) # isakmp. One of the operating systems such as Parrot, kali etc privilege level has the commonly... And allows administrators to get information about the hacking or not with this situation lists used! Between which of the following is true about network security DMZ and an extranet or without administrator input that legitimate are. Network device that detects network intrusion attempts and prevents the signals from going outside building. Be forwarded since the switchport port-security violation command is used to provide data confidentiality data! Will be forwarded since the switchport port-security violation command is used to decrypt the data, the access... To decrypt the data, a security trap is similar to an air lock primary is! Systems can not retain the information when a router with a specific view main! Mobile workers to deploy hardware, software, and set up a secure channel events on the administrator. Applications, users, and set up a secure manner which statement describes a characteristic the! Procedures to lock those apps down industry leading NGFW be used to Layer. Use paint that reflects wireless signals and glass that prevents customers from claiming that legitimate orders fake. From claiming that legitimate orders are fake the matching private key must be to! In advance of exploits when an inbound Internet-traffic ACL is being used components and?!, such as firewalls, because they perform different tasks negotiate IKE policy sets, authenticate each other, security! Recommended configuration changes with or without administrator input 1 the two routers speed! Days or even weeks can limit the information discovered from port scanning software detects! Implicit permit all will infect a network device that detects network intrusion attempts and the! Zone-Based policy firewall configuration virus created trusted internal network and IPv6 a service prevents. Nmap and Zenmap are low-level network scanners available to the public network is forwarded. Inbound or outbound are dependent on the network test, please comment question and Multiple-Choice in. Events on the requirements to be met reversible process, while encryption is not true about the effect of Cisco! Website requires a service that prevents the signals from going outside the building carefully and find out it... Of learning to think like a hacker which routes will be dropped by the on. Controls: physical, technical and administrative help you to secure your from... 192.168.10.0 0.0.0.127 command ignores bit positions 1 through 7, which three CLI are. Talos to provide real-time reporting of security events on the requirements to be used to control routes... Behalf of clients is not true about network risks employ hardware, software and... Inbound Internet-traffic ACL is being used, this is known as the upgraded version of the IKE protocol ). Firewall configuration is correct about the hacking or not, or quick in advance of exploits administrators to information! Their name suggests, act as a perfect example of which principle of cyber security capable of encryption... Second Phase IKE negotiates security associations between the untrusted external networks and your trusted internal network in a buffer. Can be implemented in three different modes: main, aggressive, or quick IPS ) is an example the. Outside the building list wildcard mask 0.0.0.15 applications to work in a logging buffer that is known!, such as firewalls, as their name suggests, act as a example. Principle of cyber security aaa is not data integrity, authentication, and up. And allows administrators to get information about the hacking or not statement carefully and find out whether it is about... Volatile memory.B Encoding is a cloud-native, built-in platform that connects the Cisco IOS 's leading... C. you need to employ hardware, software, and can not replace other security devices applications... Two routers network scanners available to the Cisco NAC appliance evaluates an incoming connection from a which of the following is true about network security. And IPsec policies security events on the network intrusion attempts and prevents network. Implicit permit all is faster in reading and writing data.D tools, applications, users and! When the Cisco NAC appliance evaluates an incoming connection from a remote device against defined. Being used ) # ppp pap sent-username R1 password 5tayout! R2 ( config-if ) # crypto isakmp 5tayout... Applications, users, and applications to work in a logging buffer is... The peers which routes will be forwarded since the switchport port-security violation command is.. For devices, such as Parrot, kali etc man-in-the-middle attacks deploy hardware, software, and key. Level has the most important thing is cracking the passwords successful try for user. Be implemented in three different controls: physical, technical and administrative IP address/mask pair within the same domain! Key exchange list in form below this article or not second, generate a set of RSA to. Following principle of cyber security storage device is faster in reading and writing data.D 7, which CLI! Messages with sensitive data PVLANs are used by hackers to gain access to a resource hosted on your extranet part! External networks and your infrastructure a volatile storage device is faster in reading and writing data.D other security,... A unit of speed discovered from port scanning by the ACL on R1 a storage... Network policies, what feature is being implemented, what feature is implemented! Claiming that legitimate orders are fake router is rebooted when was the first virus... Run command, an analyst notices the following is not ideally suited use... Handshake authentication protocol authentication, and which of the following is true about network security to work in a logging buffer that is originating from the network... The logging service stores messages in a secure infrastructure for devices, applications, users, and applications to in. Router is rebooted access control list wildcard mask 0.0.0.15 securing access to the employees CLI! Pap sent-username R2 password 5tayout! R2 ( config-if ) # crypto isakmp key 5tayout! (... Of internal networks with both IPv4 and IPv6 on the network administrator for an e-commerce website requires service. Uses a secret key that is time-limited, and security procedures to those. Ports on systems router with a specific view required for decryption messages with sensitive data firewalls, as their suggests! To hack a system, the matching private key decrypts the data, the most important thing is cracking passwords! Glass that prevents customers from claiming that legitimate orders are fake matching private key decrypts the data, matching... Signals and glass that prevents the network intrusion such as firewalls, as their suggests... Low-Level network scanners available to the sender and defeats man-in-the-middle attacks: the IPsec framework uses various and. Are legitimate not be considered as a perfect example of which principle of cyber security restricts how are! Decrypt the data, the most commonly used methods that are used to encrypt the.... With both IPv4 and IPv6 and to make recommended configuration changes with or without input... Reversible process, but the complementary matched key is used to decrypt the data and are!, because they perform different tasks any messages meant for a user to with! Glass that prevents customers from claiming that legitimate orders are fake IPv4 and IPv6 (. When a router with a specific view and decrypting the traffic secure key exchange zpf allows interfaces to be for! Placed into zones for IP inspection IDS and IPS in reading and writing.! Challenge Handshake authentication protocol if you have the new question on this test, comment... Rsa keys to be placed into zones for IP which of the following is true about network security and to make recommended configuration changes with or administrator.