1.3 Threat Management Flashcards

1
Q

what is the most secure implementation of file transfer protocol (FTP)?

A

secure file transfer protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the name for a hole in the security of an application deliberately left in place by a designer?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which malicious software infects a system without relying upon other applications for its execution?

A

a worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does an anti-virus application signature file contain?

A

it contains identifying information about viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which application or services uses TCP/UDP port 3389?

A

remote desktop protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which port number is used by TFTP?

A

UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the name for a fix that addresses a specific windows system problem or set of problems?

A

hotfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which firewall port should you enable to allow SMTP trafic to flow through the firewall?

A

port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how many TCP/UDP ports are vulnerable to malicious attacks?

A

65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which type of virus can change its signature to avoid detection?

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the default PPTP port?

A

TCP port 1723

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the purpose of NAC?

A

network access control (NAC) ensures that the computer on the network meets an organization’s security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

using role-based access control (RBAC), which entities are assigned roles?

A

users or subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the name of the area that connects to a firewall and offers services to untrusted networks?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which virus creates many variants by modifying its code to deceive antivirus scanners?

A

polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which port should you block at your network firewall to prevent telnet access?

A

port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a good solution if you need to separate two departments into separate networks?

A

VLAN segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which port number does LDAP use for communications encrypted using SSL/TLS?

A

port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which type of code performs malicious acts only when a certain set of conditions occurs?

A

a logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which firewall port should you enable to allow IMAP4 traffic to flow through the firewall?

A

TCP port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which two port does FTP use?

A

ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what does VLAN segregation accomplish?

A

it protects each individual segment by isolating the segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which port number does HTTP use?

A

port 80

24
Q

which port numbers are used by NetBIOS?

A

ports 137, 138, 139

25
Q

which type of malware appears to perform a valuable function, but actually performs malicious acts?

A

trojan horse

26
Q

which port number does LDAP use when communications are not secured using SSL/TLS?

A

port 389

27
Q

what does the acronym RBAC denote?

A

role-based access control

28
Q

which viruses are written in macro language and typically infect operating systems?

A

macro viruses

29
Q

who can change a resource’s category in a mandatory access control environment?

A

administrators only

30
Q

which port number does NNTP (network news transfer protocol) use?

A

TCP port 119

31
Q

what is a trojan horse?

A

malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems

32
Q

which port number does NTP use?

A

port 123

33
Q

what does the acronym DAC denote?

A

discretionary access control

34
Q

which firewall port should you enable to allow POP3 traffic to flow through the firewall?

A

TCP port 110

35
Q

which port number does DHCP use?

A

port 67

36
Q

which port number is used by SSL, FTPS, and HTTPS?

A

TCP port 443

37
Q

which port number is used by SSH, SCP, and SFTP?

A

port 22

38
Q

what is the default L2TP port?

A

UDP port 1701

39
Q

which type of access control associates roles with each user?

A

role-based access control (RBAC)

40
Q

why should you install a software firewall and the latest software patches and hotfixes on your computer?

A

to reduce security risks

41
Q

what is the name for a collection of hotfixes that have been combined into a single patch?

A

a service pack

42
Q

which type of access control is the multi-level security mechanism used by the department of defense (DoD)?

A

mandatory access control (MAC)

43
Q

which port number does DNS use?

A

port 53

44
Q

which port number is used by SMB?

A

tcp port 445

45
Q

what is a file considered in a mandatory access control environment?

A

an object

46
Q

what is the purpose of anti-spam application or filters?

A

to prevent unsolicited e-mail

47
Q

which type of access control was originally developed for military use?

A

mandatory access control (MAC)

48
Q

when should you install a software patch on a production server?

A

after the patch has been tested

49
Q

which type of access control is most suitable for top-secret information?

A

mandatory access control (MAC)

50
Q

which port number does SNMP use?

A

UDP port 161

51
Q

in a secure network, what should be the default permission position?

A

implicit deny

52
Q

which port number does SSH use?

A

port 22

53
Q

which type of virus attempts to hide from antivirus software and from the operating system by remaining in memory?

A

stealth

54
Q

which port is used for LDAP authentication?

A

port 389

55
Q

which self-replicating computer program sends copies of itself to other devices on the network?

A

worm

56
Q

which port number is used by microsoft SQL server?

A

tcp port 1433

57
Q

which TCP port number does secure sockets layer (SSL) use?

A

port 443