Quiz 1 Flashcards
A company has several sales offices distributed within a city. Each sales office has a SOHO network. What are two security features that are commonly found in such a network configuration? (Choose two.)
a.
Virtual Security Gateway within Cisco Nexus switches
b.
WPA2
c.
port security on user facing ports
d.
Cisco ASA firewall
e.
biometric verifications
b.
WPA2
c.
port security on user facing ports
What is an objective of a state-sponsored attack?
a.
to gain attention
b.
to gain financial prosperity
c.
to right a perceived wrong
d.
to sell operating system vulnerabilities to other hackers
c.
to right a perceived wrong
used to probe and test a firewall’s robustness using specially made forged packets.
Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools
Packet Crafting Tools
used to capture and analyze packets within traditional Ethernet LANs or WANS.
Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools
Packet Sniffers
used to probe network devices, servers, and hosts for open TCP or UDP ports.
Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools
Network Scanning & Hacking Tools
used by black hats to reverse engineer binary files when writing exploits.
Forensic Tools
Rootkit Detectors Tools
Packet Crafting Tools
Packet Sniffers
Network Scanning & Hacking Tools
Vulnerability Exploitation Tools
Debuggers Tools
Debuggers Tools
Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network?
a.
Implement encryption for sensitive traffic.
b.
Implement a firewall at the edge of the network.
c.
Implement access lists on the border router.
d.
Implement restrictions on the use of ICMP echo-reply messages.
not c
What is the purpose of a reconnaissance attack on a computer network?
a.
to gather information about the target network and system
b.
to redirect data traffic so that it can be monitored
c.
to prevent users from accessing network resources
d.
to steal data from the network servers
a.
to gather information about the target network and system
What are two data protection functions provided by MDM? (Choose two.)
a.
quarantine
b.
remote wiping
c.
physical security
d.
PIN locking
e.
inoculation
b.
remote wiping
d.
PIN locking
What is a ping sweep?
a.
a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.
b.
a software application that enables the capture of all network packets that are sent across a LAN.
c.
a query and response protocol that identifies information about a domain, including the addresses that are assigned to that domain.
d.
a network scanning technique that indicates the live hosts in a range of IP addresses.
d.
a network scanning technique that indicates the live hosts in a range of IP addresses.
Which security implementation will provide management plane protection for a network device?
a.
access control lists
b.
antispoofing
c.
role-based access control
d.
routing protocol authentication
c.
role-based access control
A security service company is conducting an audit in several risk areas within a major corporation. What statement describes the risk of using social networking?
a.
data loss through access to personal or corporate instant messaging and social media sites
b.
gaining illegal access to corporate data by stealing passwords or cracking weak passwords
c.
sensitive data lost through access to the cloud that has been compromised due to weak security settings
d.
the retrieval of confidential or personal information from a lost or stolen device that was not configured to use encryption software
a.
data loss through access to personal or corporate instant messaging and social media sites
Payment is usually made using wire transfer or crypto currencies such as Bitcoin.
Ransomware
Worm
Rootkit
Adware
Spyware
Ransomware
using pop-up web browser windows, new toolbars, or unexpectedly redirect a webpage to a different website.
Ransomware
Worm
Rootkit
Adware
Spyware
Adware
very difficult to detect because they can alter firewall, system files, and even OS commands to conceal their presence.
Ransomware
Worm
Rootkit
Adware
Spyware
Rootkit