Network Threats Flashcards

1
Q
Which of the following is a form of denial of service attack that uses spoofed ICMP packets to flood a victim with echo requests using a bounce/amplification network?
 Virus.
 IPSec.
 Smurf.
 Phising.
A

Smurf.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have worked as the network administrator for a company for seven months. One day all picture files on the server become corrupted.
You discover that a user downloaded a virus from the Internet onto his workstation, and it propagated to the server. You successfully restore all files from backup, but your boss is adamant that this situation does not reoccur.
What should you do?

It infects the MBR of a hard drive.
Install a network virus detection software solution.
Denial of Service attack.
Anti-virus software.

A

Install a network virus detection software solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
 IPSec.
 Smurf.
 Phising.
 Virus.
A

Virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Your company security policy states that wireless networks are not to be used because of the potential security risks they present to your network.
One day you find that an employee has connected to a wireless access point to the network in his office.
What type of security risk is this?

Rogue Access Point.
Phising.
Padded cell.
Awareness.

A

Rogue Access Point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following is the best countermeasure against man-in-the-middle attacks?
 Smurf.
 IPSec.
 Virus.
 Phising.
A

IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
An attacker sets up 100 drone computers that flood a DNS server with invalid requests. This is an example of which kind of attack?
 Padded cell.
 Denial of Service.
 Denial of Service attack.
 IPSec.
A

Denial of Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary countermeasure for social engineering?

Anti Virus Software
Awareness.
Education
Nothing Just Pray

A

Awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Smurf attack requires all but which of the following elements to be implemented?

Padded Cell
Amplification or Bounce network
Victim computer or network
Attacker System

A

Padded cell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is a form of attack that either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occuring?

Padded cell.
Denial of Service attack.
Man-in-the-middle attack.
Denial of Service.

A

Denial of Service attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are examples of social engineering?

Denial of Service.
 Rogue Access Point.
 Dumpster diving.
Shoulder surfing.
 It infects the MBR of a hard drive.
A

Dumpster diving.

Shoulder surfing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is not a primary characteristic of a worm?
 Man-in-the-middle attack.
 It infects the MBR of a hard drive.
 Denial of Service.
 Anti-virus software.
A

It infects the MBR of a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Capturing packets as they travel from one host to another with the intent of altering the contents of the packets is a form of which security concern?

 Eli in the Middle Attack
 Denial of Service.
 Anti-virus software.
 Man-in-the-middle attack.
 Denial of Service attack.
A

Man-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following measure are you most likely to implement in order to protect against a worm or Trojan horse?
 Anti-virus software.
 Awareness.
 Virus.
 Denial of Service.
A

Anti-virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements about the use of anti-virus software is correct?

Anti-virus software should be configured to download updated virus definitions as soon as they become available.
Anti-virus software.
A worm can replicate itself and does not need a host for distribution.
Install a network virus detection software solution.

A

Anti-virus software should be configured to download updated virus definitions as soon as they become available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Users on your network report that they have received an e-mail stating that the company has just launched a new Website for employees, and to access the Website they need to go there and enter their username and password information. No one in your company has sent this email.
What type of attack is this?
 Smurf.
 Phising.
 IPSec.
 Virus.
A

Phising.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can an organization help prevent social engineering attacks?

Educate employees on the risks and countermeasures.
A worm can replicate itself and does not need a host for distribution.
Install a network virus detection software solution.

A

Educate employees on the risks and countermeasures.

17
Q

What is the main difference between a worm and a virus?
Install a network virus detection software solution.
It infects the MBR of a hard drive.
Dumpster diving.
Shoulder surfing.
A worm can replicate itself and does not need a host for distribution.

A

A worm can replicate itself and does not need a host for distribution.

18
Q

Which of the following describes a man-in-the-middle attack?
Install a network virus detection software solution.
A worm can replicate itself and does not need a host for distribution.
A false server intercepts communications from a client by impersonating the intended server.
It infects the MBR of a hard drive.

A

A false server intercepts communications from a client by impersonating the intended server.