Mid Term Exam Flashcards

86%

1
Q

What is the most likely weak link when using asymmetric encryption for verifying message integrity and nonrepudiation?

Question 1 options:

the source of the public keys

the integrity of the private keys

the use of the sender’s private key

the hashing algorithm used to generate a message digest

A

the source of the public keys *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you see a /16 in the header of a snort rule, what does it mean?

Question 2 options:

the detected signature is 16 bits in length

the size of the log file is 16 MB

the subnet mask is 255.255.0.0

a maximum of 16 log entries should be kept

A

the subnet mask is 255.255.0.0 *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which layer does wireless communication rely heavily upon?

Question 3 options:

LLC sublayer of the Transport layer

MAC sublayer of the Network layer

LLC sublayer of the Data Link layer

MAC sublayer of the Data Link layer

A

MAC sublayer of the Data Link layer *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which type of attack do attackers intercept the transmissions of two communicating nodes without the user’s knowledge?

Question 4 options:

brute force

rogue device

wardriver

man-in-the-middle

A

man-in-the-middle *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is a valid IPv6 address?

Question 5 options:

1080::8:800:200C:417A

5510:ABCD::34:1::2

24::5B1A::346C

5BA4:2391:0:0:4C3E

A

1080::8:800:200C:417A *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which binary signaling technique uses a scheme in which zero voltage represents a 0 bit and the voltage for a 1 bit does not drop back to zero before the end of the bit period?

Question 6 options:

RTZ

polar NRZ

NRZ

polar RTZ

A

NRZ *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a reason that UDP is faster than TCP?

Question 7 options:

it doesn’t use port numbers

it doesn’t guarantee delivery

the header is smaller

it has a higher priority on the network

A

it doesn’t guarantee delivery *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To determine best path, routers use metrics such as the value of the first octet of the destination IP address.

Question 8 options:
True
False

A

False *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?

Question 9 options:

training period

profile monitoring

traffic normalizing

baseline scanning

A

training period *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following types of traffic does NOT travel through routers?

Question 10 options:

DNS zone transfers

network route information

ARP requests

SNMP status information

A

ARP requests *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

Question 11 options:

DiD

IDPS

VPN

DMZ

A

IDPS *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Fresnel zone is the dispersal pattern of waves as they travel from sending to receiving antennas.

Question 12 options:
True
False

A

False *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hactivist can best be described as which of the following?

Question 13 options:

deface Web sites by leaving messages for their friends to read

an unskilled programmer that spreads malicious scripts

consider themselves seekers of knowledge

use DoS attacks on Web sites with which they disagree

A

use DoS attacks on Web sites with which they disagree *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of scan has the FIN, PSH, and URG flags set?

Question 14 options:

SYN Scan

FIN scan

Xmas scan

Null scan

A

Xmas scan *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which frequency range are you likely to find WLANs?

Question 15 options:

3-30 MHz

2.9-30 GHz

30-300 GHz

174-328 MHz

A

2.9-30 GHz *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is NOT a suggested practice before using a newly configured wireless network?

Question 16 options:

change the manufacturer’s default key

change the administrator password

alter the default channel

use the default encryption method

A

use the default encryption method *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An NIDPS can tell you whether an attack attempt on the host was successful.

Question 17 options:
True
False

A

False *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is the IPv6 loopback address?

Question 18 options:

::FFFF

000:000::

::1

1000:127:0:0:1

A

::1 *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following is true about ACLs on Cisco routers?

Question 19 options:

there is an implicit deny any statement at the end of the ACL

there is an explicit permit any statement at the beginning of the ACL

ACLs bound to an interface apply to inbound and outbound traffic by default

ACLs are processed in reverse order so place high priority statements last

A

there is an implicit deny any statement at the end of the ACL *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why might you want to allow extra time for setting up the database in an anomaly-based system?

Question 20 options:

to add your own custom rule base

the installation procedure is usually complex and time consuming

to allow a baseline of data to be compiled

it requires special hardware that must be custom built

A

to allow a baseline of data to be compiled *

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is a command you would find in an anti-spoofing ACL for network 172.31.0.0/16?

Question 21 options:

permit ICMP any any redirect

deny TCP 172.31.0.0 0.0.0.0 any log

permit IP any 172.31.0.0 0.0.255.255 log

deny IP 172.31.0.0 0.0.255.255 any log

A

deny IP 172.31.0.0 0.0.255.255 any log -

22
Q

Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?

Question 22 options:

Sophie encrypts Mike’s message with Mike’s public key

Sophie compares the message digest she calculated to Mike’s message

a message digest of Mike’s message is calculated using a hashing algorithm

the message digest is encrypted by Mike’s private key

A

a message digest of Mike’s message is calculated using a hashing algorithm -

23
Q

How does the CVE standard make network security devices and tools more effective?

Question 23 options:

they can share information about attack signatures

it requires you to use compatible devices from one vendor

the layered approach makes attacks nearly impossible

it warns an attacker that your site is being monitored

A

they can share information about attack signatures *

24
Q

Which of the following is true about an NIDPS versus an HIDPS?

Question 24 options:

an NIDPS can compare audit log records

an HIDPS can detect intrusion attempts on the entire network

an HIDPS can detect attacks not caught by an NIDPS

an NIDPS can determine if a host attack was successful x

A

an HIDPS can detect intrusion attempts on the entire network -

25
Q

Wireless networks use the CSMA/CD media access method.

Question 25 options:
True
False

A

False *

26
Q

Which of the following is true about static routes?

Question 26 options:

they are created by routing protocols

the metric is higher than a dynamic route

they are used for stub networks

they change automatically as the network changes

A

they are used for stub networks *

27
Q

With which access control method do system administrators establish what information users can share?

Question 27 options:

administrative access control

discretionary access control

mandatory access control

role-based access control

A

mandatory access control -

28
Q

Which of the following is an IDPS security best practice?

Question 28 options:

log files for HIDPSs should be kept local

communication between IDPS components should be encrypted

all sensors should be assigned IP addresses

to prevent false positives, only test the IDPS at initial configuration

A

communication between IDPS components should be encrypted *

29
Q

Which of the following is the description of a land attack?

Question 29 options:

an illegal TCP flag is found in the segment header

the attacker uses an undefined protocol number

source and destination IP address/port are the same

the local host source address occurs in the packet

A

source and destination IP address/port are the same *

30
Q

What feature in ICMPv6 replaces ARP in IPv4?

Question 30 options:

Authentication Header

Neighbor Discovery

Multicast Listener Discovery

Echo Request

A

Neighbor Discovery *

31
Q

What is a Basic Service Set?

Question 31 options:

a group of wireless devices served by a single AP

wireless devices set up as a basic ad-hoc network

a wireless network that does not use an AP

multiple APs are set up to provide some overlap

A

a group of wireless devices served by a single AP *

32
Q

Which of the following is NOT a category of suspicious TCP/IP packet?

Question 32 options:

bad header information

suspicious data payload

suspicious CRC value

single-packet attacks

A

suspicious CRC value *

33
Q

f you are subnetting a class B network, what subnet mask will yield 64 subnets?

Question 33 options:

255.255.252.0

255.255.192.0

255.255.224.0

255.255.64.0

A

255.255.252.0 *

34
Q

With discretionary access control, network users can share information with other users, making it riskier than MAC.

Question 34 options:
True
False

A

True *

35
Q

Which of the following is true about extended IP ACLs?

Question 35 options:

the ‘established’ keyword is not available except on standard ACLs

they should be applied to an interface close to the traffic source

you can apply multiple outbound ACLs on a single interface

the default inverse mask for the source is 0.0.0.0

A

they should be applied to an interface close to the traffic source *

36
Q

Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?

Question 36 options:

RC4

Message Digest 5

Twofish

RSA

A

Message Digest 5*

37
Q

What is an advantage of the anomaly detection method?

Question 37 options:

easy to understand and less difficult to configure than a signature-based system x

system can detect attacks from inside the network by people with stolen accounts

makes use of signatures of well-known attacks

after installation, the IDPS is trained for several days or weeks

A

the system can detect attacks from inside the network by people with stolen accounts. -

38
Q

Which wireless transmission method uses a hopping code?

Question 38 options:

infrared

FHSS

OFDM

narrowband

A

FHSS *

39
Q

Why might you want your security system to provide nonrepudiation?

Question 39 options:

to prevent an unauthorized user from logging into the system

to trace the origin of a worm spread through email

so a user can’t deny sending or receiving a communication

to prevent a user from capturing packets and viewing sensitive information

A

so a user can’t deny sending or receiving a communication *

40
Q

What is the packet called where a Web browser sends a request to the Web server for Web page data?

Question 40 options:

HTML RELAY

HTTP GET

HTML SEND

HTTP XFER

A

HTTP GET *

41
Q

Packet fragmentation is not normal, and can only occur if an attack has been initiated.

Question 41 options:
True
False

A

True *

42
Q

Which of the following is true about MAC addresses in a wireless network?

Question 42 options:

you can change a WNICs MAC address with software

you need to configure the MAC address before you use the WNIC

MAC address filtering will stop a determined attacker

MAC addresses are Network layer identities

A

you can change a WNICs MAC address with software *

43
Q

IPv4 and IPv6 headers are interoperable.

Question 43 options:
True
False

A

False *

44
Q

Which of the following is true about IEEE 802.11i?

Question 44 options:

temporal key integrity protocol is used for encryption

it uses PMK to generate data encryption keys

it uses WEP2 for authentication and encryption

it uses a symmetric block cipher for encryption

A

it uses a symmetric block cipher for encryption *

45
Q

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

Question 45 options:

protocol

port

checksum

IP address

A

checksum *

46
Q

Which of the following is true about the steps in setting up and using an IDPS?

Question 46 options:

anomaly-based systems come with a database of attack signatures

false positives do not compromise network security

sensors placed on network segments will always capture every packet

alerts are sent when a packet doesn’t match a stored signature

A

false positives do not compromise network security. -

47
Q

Which of the following is a type of cryptanalysis that applies primarily to block ciphers but can also be used against stream ciphers and hashing functions and works by examining how differences in input affect the output?

Question 47 options:

XSL

differential

related key

integral

A

differential *

48
Q

Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?

Question 48 options:

SSH

SSL

IPsec

TLS

A

TLS -

49
Q

In a passive attack, cryptanalysts eavesdrop on transmissions but don’t interact with parties exchanging information.

Question 49 options:
True
False

A

True *

50
Q

Which of the following causes of signal loss is defined as differences in density between air masses over distance?

Question 50 options:

scattering

absorption

refraction

reflection

A

refraction *