Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESEExamen Seguridad informática

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
Examen Seguridad informática

Descripción:
probable examen de Seguridad Informática.

Autor:
Que lindo es la paz mental
(Otros tests del mismo autor)

Fecha de Creación:
14/02/2024

Categoría:
Informática

Número preguntas: 32
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
En relación a la opción de borrado al usar rsync, un aspecto importante es que actualiza diferencias en archivos nuevos o modificados, pero no elimina los archivos que no están en el origen. Si los archivos no existen en el origen, pero existen en el destino, estos últimos no se eliminan, solo se omiten. Qué opción te permite hacer esta acción antes, después o durante la copia -d --delete --remove-source-files --remove.
El siguiente comando permitirá copiar un Directorio Local y sus Archivos a un Equipo Remoto: rsync -avz Documentos root@192.168.0.5:/home/usuario/ Verdadero. Falso.
Related to the command TCPDUMP, the following example bellow will capture the hosts based on IP address listening on port 80: sudo tcpdump -A -s0 port 80 Verdadero. Falso.
En relación a filtros que utilizarías en wireshark para visualizar el siguiente tráfico: "Tráfico SSH desde la red 192.168.0.0/24 con destino al servidor 1.2.3.4" ip.dst==192.168.0.0/24 && ip.addr==1.2.3.4 && ssh Verdadero. Falso.
Introduzca el línea de instrucciones en CLI que me permita forzar que el adaptador wireless (wlan0) entre en modo MONITOR: .
________ is the tool we use for the management of disk array systems (RAID) on Linux. .
In relation to Wi-Fi Technology, there are ____ basic modes of authentication, and in Open Authentication process requires ____ frame communication between client and the responder to complete the process of authentication. 6, 2 2, 6 2, 4 6, 4.
In a firewall, is it possible to define a rule without conditions but with action? Yes, but it is ignored. Yes, it would apply to all packets. No.
On a newly installed Linux machine, all firewall chains have the following default policy: ACCEPT. DROP. REJECT.
Regarding the persistence of iptables rules, which command that when adding, deleting, changing, or reordering rules, will allow all these changes to take effect on the system and replace the contents of the firewall with the rules included in the /etc/firewall.rules file and then ask the user if everything went well. iptables-save &gt; /etc/firewall.rules iptables-restore < /etc/firewall.rules iptables-apply /etc/firewall.rules All of the above options are correct. Options B, C are correct.
The firewall records all actions it performs in a log file. True. The firewall does not have logging capability. It is the administrator who decides which specific rules should be logged. .
The mangle table is used to mark packets. The main use of this technique is: Implement QoS. SNAT. Connection tracking. All of the above options are correct.
When a packet has the DROP action applied to it: It is rejected, and the sender is sent an ICMP reject warning packet. It is discarded permanently. If the rule containing the DROP action belongs to a user-defined chain, the packet continues in the next chain or table. All of the above options are incorrect. .
Which operating system includes the majority of hardware firewalls? UNIX/Linux Windows RouterOS .
Network equipment and device monitoring software collects information using: SNMP An agent installed on the monitored equipment. All of the above options are correct.
Some wifi access points allow traffic to be captured and sent to a server for further analysis. This is done using the TZSP protocol, which allows 802.11 packets to be encapsulated in UDP frames. This is impossible because it would completely saturate the wifi frequency and cause a DoS block. There is no such possibility, although there are organisations working on launching a standard that would allow this.
There are two versions of the WPA wifi protocols. Please indicate the incorrect option. Personal Collective Enterprise None of the above is incorrect. .
What is the least secure wifi protocol? WPA WEP WPS Options B. and C. are correct.
What is the name for software that is responsible for capturing packets entering and leaving a network interface? Sniffer Packet analyser All of the above are correct. None of the above is correct.
A VPN consists of: Creating an encrypted tunnel between two locations. Creating an encrypted subnet. Creating two or more virtual subnets within the same subnet. All of the above are correct.
An intrusion detection system (IDS) is usually placed: Before the firewall. After the firewall. Both of the above answers are true, although it is recommended that it be placed after the firewall to reduce the number of false alarms. It is mandatory before the firewall, to reduce the number of false positives.
Are there active and passive intrusion detection systems? No Yes, there are two types of HIDS (host IDS). Yes, these are two modes of NIDS (Network IDS) None of the above is correct. .
DirectAccess is the most appropriate protocol for joining Windows machines to remote Active Directory domains, but it has one drawback. What is it? It does not work with IPv4, it needs IPv6. Traffic can be blocked on many low-end firewalls. It has low performance which penalises connection speed.
Gateway and border router are equivalent terms. True False True only in VPN networks. .
In a strong underprotected (subprotegida) network architecture, how many firewalls does the DMZ have? one two three None of the above is correct.
Perimeter security systems are implemented in: The servers of the local network. The gateway. All computers on the local network. All of the above options are incorrect.
Private IP addressing has the following purpose: Avoid address space exhaustion, as there are more devices than available devices. Protect private networks, as private IP addresses cannot be routed to public networks and vice versa. Both of the above options are correct. .
RDP allows multiple users to log in simultaneously. True False Only on windows server remote desktop services.
What traffic is allowed on a DMZ network? From the Internet to the DMZ. From the DMZ to the internal network. From the Internet to the internal network.
Related to Wireless standards, which one is focused for WLAN framework offering Central Authentication and is deployed with Extensive Authentication Protocol as WLAN Solution IEE 802.11a IEEE 802.1x IEE 802.11g IEE 802.11n.
Dado el siguiente fragmento del fichero firewall.rules de un cortafuegos empresarial con configuración de reglas mínima. Comentar las reglas iptables de las líneas descritas a continuación (cada línea comentada puntúa 0,5 ptos):.
En una empresa hay dos redes separadas por un equipo Ubuntu que hace de cortafuegos y enrutador entre las redes (no se realiza NAT, está activado net.ipv4.ip_forward=1) según se muestra en el siguiente esquema: PREGUNTA A. En el servidor Ubuntu 18 se ponen las siguientes políticas por defecto: PREGUNTA B. ¿En el servidor Ubuntu 18 en qué cadenas podemos aplicar filtros a una comunicación entre el PC 192.168.0.3 y el servidor 172.16.0.10? ¿Y a una comunicación entre el servidor Ubuntu 18 y el servidor Web-FTP? PREGUNTA C. Comandos iptables que indicarías en el servidor Web-FTP para bloquear el acceso al servicio ftp de 172.16.0.10 desde los 3 PCs y permitirlo desde el equipo Ubuntu 18. Permitir el acceso web desde cualquier lugar. Bloquear el resto de tráfico (opción -P) . PREGUNTA D. Comandos iptables en el cortafuegos Ubuntu 18 para bloquear el ping entre el PC 192.168.0.2 y 172.16.0.3 aunque el usuario de este último cambie la configuración IP .
Denunciar test Consentimiento Condiciones de uso