Network Threats Flashcards
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network? Virus. IPSec. Smurf. Phising.
Smurf.
You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted.
You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur.
What should you do?
It infects the MBR of a hard drive.
Install a network virus detection software solution.
Denial of Service attack.
Anti-virus software.
Install a network virus detection software solution.
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found? IPSec. Smurf. Phising. Virus.
Virus.
Your company security policy states that wireless networks are not to be used because of the potential security risks they present to your network.
One day you find that an employee has connected to a wireless access point to the network in his office.
What type of security risk is this?
Rogue Access Point.
Phising.
Padded cell.
Awareness.
Rogue Access Point.
Which of the following is the best countermeasure against man-in-the-middle attacks? Smurf. IPSec. Virus. Phising.
IPSec.
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack? Padded cell. Denial of Service. Denial of Service attack. IPSec.
Denial of Service.
What is the primary countermeasure for social engineering?
Anti Virus Software
Awareness.
Education
Nothing Just Pray
Awareness.
A Smurf attack requires all but which of the following elements to be implemented?
Padded Cell
Amplification or Bounce network
Victim computer or network
Attacker System
Padded cell.
Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring?
Padded cell.
Denial of Service attack.
Man-in-the-middle attack.
Denial of Service.
Denial of Service attack.
Which of the following are examples of social engineering?
Denial of Service. Rogue Access Point. Dumpster diving. Shoulder surfing. It infects the MBR of a hard drive.
Dumpster diving.
Shoulder surfing.
Which of the following is not a primary characteristic of a worm? Man-in-the-middle attack. It infects the MBR of a hard drive. Denial of Service. Anti-virus software.
It infects the MBR of a hard drive.
Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?
Eli in the Middle Attack Denial of Service. Anti-virus software. Man-in-the-middle attack. Denial of Service attack.
Man-in-the-middle attack.
Which of the following measure are you most likely to implement in order to protect against a worm or Trojan horse? Anti-virus software. Awareness. Virus. Denial of Service.
Anti-virus software.
Which of the following statements about the use of anti-virus software is correct?
Anti-virus software should be configured to download updated virus definitions as soon as they become available.
Anti-virus software.
A worm can replicate itself and does not need a host for distribution.
Install a network virus detection software solution.
Anti-virus software should be configured to download updated virus definitions as soon as they become available.
Users on your network report that they have received an e-mail stating that the company has just launched a new Website for employees, and to access the Website they need to go there and enter their username and password information. No one in your company has sent this email. What type of attack is this? Smurf. Phising. IPSec. Virus.
Phising.