Protecting Your Network Flashcards

1
Q

A hacker who sends an e-mail but replaces his return e-mail address with a fake one is _______________ the e-mail address.

hardening

malware

spoofing

A

spoofing

This is a classic example of spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is a tool to prevent ARP cache poisoning?

DHCP

DAI

Edge firewall

A

DAI

Cisco Dynamic ARP Inspection (DAI) is designed to help prevent ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A computer compromised with malware to support a botnet is called a _______________.

zombie

reflection

DDoS

A

zombie

All of the compromised systems on a botnet are called zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The goal of this aspect of a DoS attack is to make the attacked system process each request for as long as possible.

rotation

destruction

amplification

A

amplification

The goal of amplification is to keep the targeted server as busy as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user’s machine is locked to a screen telling her she must call a number to unlock her system. What kind of attack is this?

DDoS

Logic bomb

Ransomware

A

Ransomware

Ransomware attacks can be brutal, demanding money to unlock your content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attack where someone tries to hack a password using every possible password permutation is called what?

Spoofing

Rainbow table

Brute force

A

Brute force

Brute force uses every possible permutation and is often used in password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Windows utility displays open ports on a host?

netstat

ping

ipconfig

A

netstat

Only netstat shows all open ports on a Windows system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following protocols are notorious for cleartext passwords? (Select two.)

SSH

Telnet

HTTPS

POP3

A

Telnet

POP3

Both Telnet and POP3 use cleartext passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The NSA’s TEMPEST security standards are used to combat which risk?

RF emanation

Spoofing

DDoS

A

RF emanation

TEMPEST is designed to reduce RF emanation using enclosures, shielding, and even paint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bob is told by his administrator to go to www.runthisantimalware.com and click the “Run the program” button on that site to check for malware. What form of anti-malware delivery is this called?

Host-based

Network-based

Cloud-based

A

Cloud-based

The fact that he is going to a Web site shows this is cloud-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly