Quiz 1 Flashcards

1
Q

Question 1 options:

industrial espionage

financial gain

all of the above

revenge

A

all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In an IDPS, specific indications of a possible attack are called

Question 2 options:

signatures

true positives

signals

alerts

A

signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following malware is designed to replicate itself?

Question 3 options:

A) virus

B) SYN flood

C) Trojan horse

D) worm

A

A) virus

D) worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An uninterruptible power supply is a component of what type of security?

Question 4 options:

virtual

physical

password

auditing

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most network threats originate from which of the following?

Question 5 options:

inside the company

industrial spies

script kiddies

back doors

A

inside the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Stuxnet worm was designed to

Question 6 options:

be used by script kiddies

shut down Internet DNS servers

disrupt computer-controlled industrial operations

steal financial information

A

disrupt computer-controlled industrial operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The capability to prevent one participant in an electronic transaction from denying that
it performed an action is called

Question 7 options:

integrity

nonrepudiation

undeniability

plausible deniability

A

nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Servers with outside access to the public should be located on

Question 8 options:

A) an internal LAN

B) a DMZ

C) their own subnet

D)a network perimeter

A

B) a DMZ

C) their own subnet

D)a network perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A packet-filtering device evaluates data in the payload and compares it with a predefined
set of rules.

Question 9 options:
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IP address combined with a TCP/IP port number is called which of the following?

Question 10 options:

socket

script

port ID

network address

A

socket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name four goals of network security.

A

nonrepudiation,
Confidentiality,
Integrity,
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet filters can block or allow transmission of packets based on which of the following
criteria?

Question 12 options:

A) time of access attempts

B) open ports

C) port number

D) IP address

A

A) time of access attempts

D) IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a restrictive firewall policy, what is the starting point for developing a rule base?

Question 13 options:

allow all traffic except specified types

block all traffic

block all traffic except specified types

allow all traffic

A

block all traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall enforcement of policies is handled primarily through setting up packet-filtering
rules, a set of which is contained in the

Question 14 options:

access control list

packet filter

rule base

routing table

A

rule base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attacker who causes harm to systems in support of some principle is categorized
as which of the following?

Question 15 options:

cracker

cyberterrorist

industrial spy

hacker

A

cyberterrorist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some of the reasons for network attacks?

financial gain

industrial espionage

revenge

all of the above

A

all of the above