CH19 - Course Quiz Flashcards
A basic ACL can be thought of as a stateful firewall?
True
False
False
Explanation:
ACL can be considered Stateless.
Which type of malware looks or pretends to do one thing while, at the same time, doing something evil?
macro
rootkit
worm
Trojan
Trojan
Which term refers to any form of potential attack against your Network?
threat
contingency
vulnerability
risk
threat
Which type of firwall packet inspection examines each packet fresh, with no regard to the state of the packet’s relation to any other packet?
port
stateless
stateful
filtered
stateless
Even with the best anti-malware tools, there are times when malware still manages to strike your computer?
True
False
True
A group of computers under the control of one operator is called a zombie?
True
False
False
Which term refers to the administrative account native to Linux?
supervisor
administrator
admin
root
root
A Trojan can appear as a game, like poker?
True
False
True
The first and last bastion of defense for an entire infrastructure’s security is at the individual ____________?
user accounts
hosts
ports
NICs
hosts
Firewalls consider traffic as either ______________?
private or public
encrypted or unencrypted
inbound or outbound
persistent or non-persistent
inbound or outbound
______________ can run on a single computer or within a virtual machine and can look like a simple network or a vast installation?
Demilitarized Zones
Honeynets
Posture Assessments
Access Control Lists
Honeynets
A worm has to wait for someone to use a removable drive to replicate?
True
False
False
What are the most common symptoms of malware on a compromised system?
general sluggishness and random crashes
dropping the Internet connection and intermittent blank screens
random messages and a blank screen
general sluggishness and random messages
general sluggishness and random crashes
One of the first techniquest that malicious users try to probe hosts to identify any ___________ ports?
closed
blocked
locked
open
open
Which type of firewall packet inspection is aware of the packet’s state, as it relates to other packets?
port
filtered
stateful
stateless
stateful
Which term refers to a single computer under the control of an operator?
smurf attack
DDoS
zombie
phishing
zombie
Honeynets can run on a single computer or within a virtual machine?
True
False
True
Which type of attack is a form of social engineering?
denial of service
zombie
logic bomb
phishing
phishing
Which type of malware replicates exclusively through Networks?
Trojan
rootkit
macro
worm
worm
Which term refers to a program that monitors the types of Web Sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?
Trojan Horse
macro
Spyware
Adware
Adware
Explanation:
Key Word - “…to generate targeted advertisements”
Adware is a program that monitors the types of Web Sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows.
Spyware is a function of any program that sends information about your system or your actions over the Internet. Browsing History, Keystrokes, Email Contacts, etc…
A _____________ host is simply a machine that is fully exposed to the Internet?
external
stateless
bastion
open
bastion
Trojan horses do NOT replicate?
True
False
True
A deauthentication (deauth) attack is a form of ________________ attack?
RF emanation
DoS
DHCP Snooping
Social Engineering
DoS (Denial of Service)
You can use a brute force attack to search for open ports?
True
False
True