Net+ Quiz 3 Flashcards

1
Q

Which of the following is a type of denial of service attack?

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is not a type of threat that can affect your network?

A

access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of virus impacts files with the filename extensions .com, .exe, and .dll?

A

file viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop?

A

WEP INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Monkey B, Michelangelo, Stoned, and Stealth boot are examples of which type of virus?

A

boot sector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of virus affects both the boot sector and files on a computer?

A

multiparte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main difference between a worm and a virus?

A

worms can replicate without user intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What kind of attack involves the hacker attempting all combinations of characters for a password to gain access?

A

brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of security threat allows an attacker to learn your password through the use of an email or phone call?

A

man-in-the-middle INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of policy should be implemented to secure important company documents and materials when employees leave thier workstations?

A

clean desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you implement a set of policies and procedures that define corporate information as confidential and then train employees on these procedures, what type of attack can you prevent?

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of wireless frame populates the display when someone is scanning for Wireless Networks?

A

SSID INCORRECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What defines the appropriate response to a security event on a network?

A

implementing security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following security mechanisms has been compromised?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What process allows you to update your Windows-based operating system?

A

windows update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is it important to keep your system patched and up-to-date?

A

to fix system vulnerabilities

17
Q

Which value does a wireless station use to choose an access point?

18
Q

Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it?

A

heuristic scan

19
Q

What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses?

A

definition files

20
Q

What type of scan can be done by an antivirus program?

A

all of the above

21
Q

In which layer of the OSI model do software firewalls operate? (Choose all that apply)

A

application

22
Q

What is the main difference between a network-based firewall and a host-based firewall?

A

A network-based firewall protects a network, not just a single host.

23
Q

What is the benefit of using a firewall?

A

protects LAN resources

24
Q

What is it called when the firewall ignores an attack?

A

false negative INCORRECT

25
What is the function of a DMZ?
create security zone that allows private traffic but is isolated from public INCORRECT
26
Which type of security device monitors network traffic, looking for signs of an intrusion?
IDS
27
Which of the following is NOT a function of NMAP?
collects passwords
28
Changing network configurations, terminating sessions, and deceving the attacker are actions that can be taken from what type of security device?
IPS
29
A _______________ firewall keeps track of the established connections passing through it.
network INCORRECT
30
UTP cable has specific colors for the wire associated with each pin. Based on the TIA/EIA 568B wiring standard, what is the correct color order, starting with pin 1?
orange, white orange INCORRECT
31
UTP cables use which type of connector?
RJ-45
32
You have upgraded the firmware on your switches and access points. What documentation do you need to update?
Wiring Schematics INCORRECT
33
Which type of Windows server log will give information about specific programs?
application
34
Which network-performance optimization technique can delay packets that meet certain criteria to guarantee usable bandwidth for other applications?
Load balancing INCORRECT
35
To optimize performance on your network, which of the following control traffic in some way?
all of the above