Network Security Principles Flashcards
What type of attack involves the hacker altering the source address of a packet?
Dictionary attack
Social engineering attack
Spoof attack
Spoof attack
Spoof attack is the term used for when the hacker alters the source address of the packet. There are different types of spoofing, depending on what source address is being altered: IP spoofing, MAC spoofing, and e-mail spoofing
What type of password attack involves using dictionary words and appending numbers to the end of those words?
Brute-force
Dictionary
Hybrid
Hybrid
A hybrid attack, like a dictionary attack, uses a word list file, but also tries popular modifications on the words, such as adding a number to the end of the dictionary word
What portion of the Windows security subsystem handles both local security policies and user authentication, and generates audit log messages?
Local Security Authority (LSA)
Security Accounts Manager (SAM)
Security Reference Monitor
Local Security Authority (LSA)
The Local Security Authority (LSA) handles these functions above the Security Accounts Manager and Security Reference Monitor. Those services are used to provide specific functions for the LSA
What portion of the Windows security architecture maintains the database used for storing user and group account information on a local Windows 10 system?
Local Security Authority (LSA)
Security Reference Monitor
Security Accounts Manager (SAM)
Security Accounts Manager (SAM)
The Security Accounts Manager (SAM) is the database of users and groups contained on a local Windows system
What access control list object determines which users and groups have permissions to an object?
System access control list (SACL)
Discretionary access control list (DACL)
Owner
Discretionary access control list (DACL)
The discretionary access control list (DACL) determines which users and groups have permissions to an object
Which of the following allows a user to modify the contents of a file?
Read
List Folder Contents
Modify
Modify
The Modify permission is the permission that allows a user to modify (and delete) a file
A user’s credentials are checked against a database of accounts that are allowed to access the network. This process is known as ________________.
Authorization
Authentication
Rights
Authentication
Authentication is the process of logging on to the network
What type of device analyzes packets that attempt to enter the network and then either allows or denies the traffic, based on rules?
Encryption
Firewall
Router
Firewall
A firewall is used to secure the internal network from the outside world by rules configured on the firewall that specify which packets to drop and which packets to allow through
Which encryption scheme uses the same encryption key to decrypt the data as the one that encrypted it?
Asymmetric
RSA standard
Symmetric
Symmetric
In symmetric encryption, both parties use the same key to encrypt and decrypt the data
Which of the following is classified as an encryption method? (Choose all that apply.)
Stream cipher
Data cipher
Byte cipher
Block cipher
Stream cipher
Block cipher
Stream cipher and block cipher are valid encryption methods
Which block cipher mode encrypts each block individually during the encryption process?
Electronic Codebook (ECB)
Cipher Block Chaining (CBC)
Cipher Feedback (CFB)
Electronic Codebook (ECB)
The Electronic Codebook (ECB) mode encrypts each block individually, but the Cipher Block Chaining and Cipher Feedback modes do not
What encryption standard is based on a fixed 56-bit symmetric key encryption algorithm?
RSA
DES
CPA
DES
The Data Encryption Standard (DES) uses this algorithm
What technology uses certificate authorities to verify that a message has not been tampered with?
RSA encryption
Local Security Authority
Digital signatures
Digital signatures
Digital signatures technology does not encrypt the message—it only verifies that it arrived without being tampered with
Which disaster recovery site provides only the facility, but no equipment or copy of the original data?
Hot site
Blue site
Cold site
Cold site
A cold site provides only the disaster recovery facility. The equipment and data are the responsibility of the company using the facility
Which disaster recovery site provides the facility and ensures that the site has an up-to-date copy of the data necessary to have a fully functional site?
Hot site
Warm site
Blue site
Hot site
A hot site provides the facility and the equipment, and it will ensure that an up-to-date copy of an organization’s data is available in case of disaster