Network Security Principles Flashcards

1
Q

What type of attack involves the hacker altering the source address of a packet?

Dictionary attack

Social engineering attack

Spoof attack

A

Spoof attack

Spoof attack is the term used for when the hacker alters the source address of the packet. There are different types of spoofing, depending on what source address is being altered: IP spoofing, MAC spoofing, and e-mail spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of password attack involves using dictionary words and appending numbers to the end of those words?

Brute-force

Dictionary

Hybrid

A

Hybrid

A hybrid attack, like a dictionary attack, uses a word list file, but also tries popular modifications on the words, such as adding a number to the end of the dictionary word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What portion of the Windows security subsystem handles both local security policies and user authentication, and generates audit log messages?

Local Security Authority (LSA)

Security Accounts Manager (SAM)

Security Reference Monitor

A

Local Security Authority (LSA)

The Local Security Authority (LSA) handles these functions above the Security Accounts Manager and Security Reference Monitor. Those services are used to provide specific functions for the LSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What portion of the Windows security architecture maintains the database used for storing user and group account information on a local Windows 10 system?

Local Security Authority (LSA)

Security Reference Monitor

Security Accounts Manager (SAM)

A

Security Accounts Manager (SAM)

The Security Accounts Manager (SAM) is the database of users and groups contained on a local Windows system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What access control list object determines which users and groups have permissions to an object?

System access control list (SACL)

Discretionary access control list (DACL)

Owner

A

Discretionary access control list (DACL)

The discretionary access control list (DACL) determines which users and groups have permissions to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following allows a user to modify the contents of a file?

Read

List Folder Contents

Modify

A

Modify

The Modify permission is the permission that allows a user to modify (and delete) a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user’s credentials are checked against a database of accounts that are allowed to access the network. This process is known as ________________.

Authorization

Authentication

Rights

A

Authentication

Authentication is the process of logging on to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of device analyzes packets that attempt to enter the network and then either allows or denies the traffic, based on rules?

Encryption

Firewall

Router

A

Firewall

A firewall is used to secure the internal network from the outside world by rules configured on the firewall that specify which packets to drop and which packets to allow through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which encryption scheme uses the same encryption key to decrypt the data as the one that encrypted it?

Asymmetric

RSA standard

Symmetric

A

Symmetric

In symmetric encryption, both parties use the same key to encrypt and decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is classified as an encryption method? (Choose all that apply.)

Stream cipher

Data cipher

Byte cipher

Block cipher

A

Stream cipher

Block cipher

Stream cipher and block cipher are valid encryption methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which block cipher mode encrypts each block individually during the encryption process?

Electronic Codebook (ECB)

Cipher Block Chaining (CBC)

Cipher Feedback (CFB)

A

Electronic Codebook (ECB)

The Electronic Codebook (ECB) mode encrypts each block individually, but the Cipher Block Chaining and Cipher Feedback modes do not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What encryption standard is based on a fixed 56-bit symmetric key encryption algorithm?

RSA

DES

CPA

A

DES

The Data Encryption Standard (DES) uses this algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What technology uses certificate authorities to verify that a message has not been tampered with?

RSA encryption

Local Security Authority

Digital signatures

A

Digital signatures

Digital signatures technology does not encrypt the message—it only verifies that it arrived without being tampered with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which disaster recovery site provides only the facility, but no equipment or copy of the original data?

Hot site

Blue site

Cold site

A

Cold site

A cold site provides only the disaster recovery facility. The equipment and data are the responsibility of the company using the facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which disaster recovery site provides the facility and ensures that the site has an up-to-date copy of the data necessary to have a fully functional site?

Hot site

Warm site

Blue site

A

Hot site

A hot site provides the facility and the equipment, and it will ensure that an up-to-date copy of an organization’s data is available in case of disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of spare component has power supplied to it and is ready to take over if the original component fails?

Cold spare

Network spare

Hot spare

A

Hot spare

A hot spare is connected and already has power supplied to it so that there is minimal delay for failover

17
Q

Which of the following pieces of software provide a vulnerability scan of the network? (Choose two.)

LanGuard

Norton AntiVirus

Microsoft Baseline Security Analyzer

Microsoft AntiSpyware

A

LanGuard

Microsoft Baseline Security Analyzer

LanGuard and the Microsoft Baseline Security Analyzer are examples of vulnerability scanners that allow you to audit the network for security-related problems

18
Q

After installing a network operating system, what should you do before placing the machine on the network to help secure it?

Harden the operating system.

Disable the firewall.

Configure e-mail.

A

Harden the operating system.

After installing the network operating system, you should harden it, which involves removing unnecessary services. Removing unnecessary services helps secure the system, because each additional piece of software running provides more security holes for a hacker to find

19
Q

After hardening the operating system, what should you do to ensure that your server has all security fixes applied to it?

Install antivirus software.

Install antispyware software.

Patch the server.

A

Patch the server.

After hardening the operating system, you should patch the server to apply security fixes to any software running on the server