Ch 9: Network Risk Management Flashcards

1
Q

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

A

metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements correctly describes the malware characteristic of polymorphism?

A

Polymorphic malware can change its characteristics every time it is transferred to a new system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

A

logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements describes a worm?

A

A program that runs independently of other software and travels between computers and across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

A

man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following scenarios represents a phishing attempt?

A

An e-mail was sent to a manager at your company that appeared to be from the company’s CTO, asking for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a red team-blue team exercise, what is the purpose of the blue team?

A

The blue team is charged with the defense of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

A

quid pro quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

A

tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the typical social engineering attack cycle, what occurs at Phase 3?

A

The attacker exploits an action undertaken by the victim in order to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

A

principle of least privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What statement regarding denial-of-service (DoS) attacks is accurate?

A

A denial-of-service attack prevents legitimate users from accessing normal network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilized by China’s so-called “Great Firewall”, what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Nmap utility used for?

A

It is a port scanning utility that can identify open ports on a host.

17
Q

How is a posture assessment performed on an organization?

A

A thorough examination of each aspect of the organization’s network is performed to determine how it might be compromised.

18
Q

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

A

cipher lock

19
Q

An RFID label on a box is an example of what type of physical security detection method?

A

asset tracking tagging

20
Q

What statement regarding the different versions of the SHA hashing algorithm is accurate?

A

SHA-2 and SHA-3 both support the same hash lengths.

21
Q

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

22
Q

Which command can be used on a Windows system to create a hash of a file?

A

Get-FileHash

23
Q

VMware’s AirWatch and Cisco’s Meraki Systems Manager are both examples of what type of software?

A

mobile device management software

24
Q

A variant of BYOD, what does CYOD allow employees or students to do?

A

They can choose a device from a limited number of options.

25
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
acceptable use policy document
26
What document addresses the specific concerns related to special access given to administrators and certain support staff?
privileged user agreement
27
Which of the following scenarios would necessitate the use of a non-disclosure agreement?
Your company needs to prevent a new contractor from sharing information with a potential competitor.
28
How often should you require users to change their passwords?
every 60 days
29
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?
deauthentication attack
30
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
distributed reflection denial-of-service attack