Module 3: System and Network Defense Quiz Answers

Cybersecurity Essentials Module 3 Quiz Answers

Module 3: System and Network Defense Quiz Question Answers

1. You are setting up a wireless network. What technology should you set up on the network to prevent man-in-the-middle attacks?

  • Mutual authentication
  • Biometric authentication

2. What type of lock is recommended to secure an office door?

  • Cipher lock
  • Keyed entry lock
  • Security cage
  • Cable lock

Explanation: A cipher lock uses buttons that are pressed in a given sequence to open the door. It can be programmed so that a user’s code may only work during certain days or times. It can also keep a record of when the door opened, and the code used to open it.

3. What can you do to ensure that network operating software remains secure? (Choose three.)

  • Install patches and updates regularly
  • Implement data classification standards
  • Conduct software testing prior to launch
  • Develop a policy to address application software and operating system updates

Explanation: To secure operating systems against threats, policies that address application system and operating system updates should be implemented so that patches and operating system updates are installed regularly.

4. What is a demilitarized zone (DMZ)?

  • A small network between two trusted private networks
  • A small network between a trusted private network and the Internet
  • A demilitarized zone (DMZ) is a small network between a trusted private network and the Internet.

5. Which type of technology can prevent malicious software from displaying unwanted popup ads on a device?

  • Spyware protection
  • Antivirus protection
  • Adware protection

Explanation: Adware protection is software that can can be installed on a computer system to prevent popup ads from displaying.

6. What would you set up to divide a computer network into smaller parts with the aim of improving network performance and security?

  • A DMZ
  • A VLAN
  • A LAN

7. Which of the following enables secure contactless payment?

  • USB communication
  • Infrared (IR)
  • Near-field communication (NFC)

Explanation: Near-field communication (NFC) allows contactless communication between devices. NFC chips use electromagnetic fields to enable contactless payments, meaning, for instance, that you simply need to hold your device close to a payment terminal to process payment.

8. What feature does Microsoft Windows use for full disk encryption (FDE)?

  • Trusted Platform Module (TPM)
  • BitLocker To Go
  • Measured Boot
  • BitLocker

Explanation: The Windows Encrypting File System (EFS) feature allows users to encrypt files, folders or an entire hard drive. Full disk encryption (FDE) encrypts the entire contents of a drive (including temporary files and memory). Microsoft Windows uses BitLocker for FDE.

9. What can be used to ensure that a piece of software you are installing is authentic?

  • Code signing
  • Secure cookies
  • Validation rules
  • A checksum

10. You want to keep unauthorized users and devices out of a private network. What solution would you use?

  • Network Access Control (NAC)
  • NetFlow

Explanation: Network Access Control (NAC) is a networking solution that protects a private network from unauthorized users and devices. NAC only allows authorized users with security-compliant systems to access the network. For example, a laptop that is part of a home wireless network may not be allowed to connect remotely to the office network.

11. What technique can a developer use to prevent software from being reverse engineered by a hacker?

  • Stored procedure
  • Code reuse
  • Obfuscation
  • Normalization

12. ‘Remote-access VPNs allow mobile workers to access the corporate network using a VPN client installed on their device.’ Is this statement true or false?

  • True
  • False

13. You want to install a system on the network to monitor traffic and immediately respond to any threats identified. Which of the following should you use?

  • An Intrusion Prevention System (IPS)
  • An Intrusion Detection Systems (IDS)

14. Which environment should be used by developers to verify that software runs under the required security settings?

  • Production environment
  • Sandbox environment
  • Staging environment
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments