Intro to Network Security Flashcards

1
Q

A user that does not want to be identified while communicating on a network uses an application to alter the computer’s identity.

Which type of exploit is being perpetrated?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer’s cache of IP address to MAC address mappings that are cached.

Which exploit is the attacker perpetrating?

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself?

A

Wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold?

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department.

Which tool or utility will allow the user to watch network traffic in real time to identify a target?

A

Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which group of attackers is typically used for penetration testing?

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of attack exploits an unpatched software vulnerability?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker’s account with the new user password to see if they can log in as the coworker.

Which type of vulnerability does this create?

A

Default password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone.

What type of vulnerability is represented?

A

BYOD/Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is required to establish a secure connection to a remote network over an insecure link?

A

Virtual Private Network (VPN) service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization is concerned about brute force attacks.

How should the organization counter this risk?

A

Institute a log-in policy that locks users out of an account after three failed password attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization suffers a social engineering attack that results in a cybercriminal gaining access to its networks and to its customers’ private information.

How can the organization mitigate this risk in the future?

A

Provide regular cybersecurity training for employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attacker plans to exploit flaws in an operating system to gain access to a user’s computer system.

What is a prevention mechanism for this type of attack?

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An unauthorized third-party has gained access to a company network.

How can they be prevented from deleting data?

A

Access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attacker has gained access to the passwords of several employees of a company through a brute force attack.

Which authentication method would keep the attacker from accessing the employees’ devices?

A

MFA (multi-factor authentication)

17
Q

After downloading a CD/DVD burning program, a user notices that someone is remotely accessing the computer during nighttime hours.

Which type of malware is likely found in the CD/DVD software?

A

Trojan horse

18
Q

A user is working on a home computer when another user seems to open an application to view documents on the same computer. The user immediately suspects that a back door into the computer exists.

Which action should be taken first to deal with the problem?

A

Unplug the PC’s network connection

19
Q

A user receives an email from an unknown bank saying that the user’s account with the bank has been compromised. The user suspects that this is a phishing exploit.

How should the user safely proceed?

A

Open a new browser page, navigate to the bank’s website, and acquire legitimate contact information to report the email.

20
Q

An analyst has identified an active denial of service attack.

Which category of the CIA triad is affected?

A

Availability

21
Q

While investigating a security incident, a technician discovers an unauthorized packet-capturing tool on the network.

Which category of the CIA triad is being attacked?

A

Confidentiality

22
Q

A malicious user was able to lock a user’s account after guessing the user’s password multiple times unsuccessfully.

Which category of the CIA triad did the malicious user target in this attack?

A

Availability

23
Q

Which category of the CIA triad is affected when an unauthorized user changes the data within a read-only file?

A

Integrity