MOD 10 QUIZ - Secure Communication and Network Attacks Flashcards

1
Q

What is an example of a loopback address?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Social Engineering?

A

When an unknown, unauthorized person gains the trust of someone inside of your organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SMTP and what port does it use?

A

Simple Mail Transfer Protocol, 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can only specific physical addresses be allowed into a system?

A

MAC Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does telecommuting generally require?

A

Remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an attack that floods a switch with random MAC frames forcing it to act like a hub?

A

MAC Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is MAC spoofing?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a means by which remote communications can be secured when telecommuting?

A

Using a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common Network Attacks?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is SDN?

A

Software Defined Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Emails server as the common deliver mechanism for what kinds of attacks

A

Viruses
Worms
Macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False:
Encryption is native for SMTP mail applications

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is VM Escaping?

A

Gaining unauthorized access to adjacent virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Network Address Translation?

A

Translating an internal, private IP into a public IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the network communication process that protects the contents of protocol packets by encapsulating them in packets of another protocol?

A

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Stateful NAT?

A

Maintains information about communications between internal and external systems

15
Q

What is SAN?

A

Storage Area Network

16
Q

What are the several security goals for email?

A
17
Q

What is the primary protocol suite used in networks and the internet?

A

TCP/IP

18
Q

What is the physical control of all connection points or the management of TCP and UDP logical access points?

A

Port Security