Securing Your Networks

18. What does tcpdump do?

  • Handles packet injection
  • Brute forces password databases
  • Generates DDoS attack traffic
  • Performs packet capture and analysis

19. What can protect your network from DoS attacks?

  • DHCP Snooping
  • Dynamic ARP Inspection
  • Flood Guard
  • IP Source Guard

20. What occurs after a Network Intrusion Detection System (NIDS) first detects an attack?

  • Triggers alerts
  • Shuts down
  • Blocks traffic
  • Disables network access

21. What does a Network Intrusion Prevention System (NIPS) do when it detects an attack?

  • It blocks the traffic.
  • It does nothing.
  • It triggers an alert.
  • It attacks back.

22. How do you protect against rogue DHCP server attacks?

  • IP Source Guard
  • Flood Guard
  • Dynamic ARP Inspection
  • DHCP Snooping

23. What underlying symmetric encryption cipher does WEP use?

  • RSA
  • AES
  • RC4
  • DES

24. What traffic would an implicit deny firewall rule block?

  • Outbound traffic only
  • Nothing unless blocked
  • Everything that is not explicitly permitted or allowed
  • Inbound traffic only

25. What allows you to take all packets from a specified port, port range, or an entire VLAN and mirror the packets to a specified switch port?

  • DHCP Snooping
  • Promiscuous Mode
  • Network hub
  • Port Mirroring

26. What kind of attack does IP Source Guard (IPSG) protect against?

  • IP Spoofing attacks
  • DoS attacks
  • ARP Man-in-the-middle attacks
  • Rogue DHCP Server attacks

27. What can be configured to allow secure remote connections to web applications without requiring a VPN?

  • Reverse proxy
  • RC4
  • NIDS
  • Web browser

27. What can be configured to allow secure remote connections to web applications without requiring a VPN?

  • Reverse proxy
  • RC4
  • NIDS
  • Web browser

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply