Quiz 2 Flashcards
Which of the following is not a denial-of-service attack?
Exploiting a flaw in a program to consume 100 percent of the CPU
Sending malformed packets to a system, causing it to freeze
Performing a brute-force attack against a known user account
Sending thousands of emails to a single address
Performing a brute-force attack against a known user account
Why is spam so difficult to stop?
filters are ineffective at blocking inbound messages.
The source address is usually spoofed.
It is an attack requiring little expertise.
Spam can cause denial-of-service attacks.
The source address is usually spoofed.
Which of the following is not a benefit of NAT?
Hiding the internal IP addressing scheme
Sharing a few public Internet addresses with a large number of
internal clients
Using the private IP addresses from RFC 1918 on an internal
network
filtering network traffic to prevent brute-force attacks
filtering network traffic to prevent brute-force attacks
Which of the following can prevent e-mail spoofing? Pretty good privacy Point-to-point protocol Microcom networking protocol Password authentication protocol
Pretty good privacy
Countermeasures against sniffers do not include which of the
following?
Using recent version of secure shell protocol.
Applying end-to-end encryption.
Using packet filters.
Implementing robust authentication techniques.
Using packet filters.
A virtual private network (VPN) cannot provide or improve which of the following security services? Availability Confidentiality Integrity Replay protection
Availability
In a distributed computing environment, system security takes on
an important role. Two types of network attacks exist: passive and
active. Which of the following is an example of a passive attack?
Attempting to log in to someone else’s account
Installing a wiretap on a network cable to generate false
messages
Denying services to legitimate users
Sniffng a system password when the user types it
Sniffng a system password when the user types it
Which of the following cannot protect non-IP protocols? IPsec PPTP L2TP L2F
IPsec
A major risk involving the use of packet-switching networking is that:
It is possible that some packets can arrive at their destinations
out of sequence.
It is not possible to vary the routing of packets depending on
network conditions.
Terminals attached to a public data network may not have
enough intelligence.
Terminals attached to a public data network may not have
enough storage capacity.
It is possible that some packets can arrive at their destinations
out of sequence.
Frame relay and X.25 networks are part of which of the following? Circuit-switched services Cell-switched services Packet-switched services Dedicated digital services
Packet-switched services
What is it called when email itself is used as an attack mechanism? Masquerading Spoofing Mail-bombing Smurf attack
Mail-bombing
What are the two common data classification schemes? Military and private sector Personal and government Private sector and unrestricted sector Classified and unclassified
Military and private sector
When seeking to hire new employees, what is the first step? Create a job description. Set position classification. Screen candidates. Request resumes
Create a job description.
Which of the following is a primary purpose of an exit interview?
To return the exiting employee’s personal belongings
To review the nondisclosure agreement
To evaluate the exiting employee’s performance
To cancel the exiting employee’s network access accounts
To review the nondisclosure agreement
Which of the following statements is not true?
IT security can provide protection only against logical or technical
attacks.
The process by which the goals of risk management are achieved is
known as risk analysis.
Risks to an IT infrastructure are all computer based.
An asset is anything used in a business process or task.
Risks to an IT infrastructure are all computer based.
When a safeguard or a countermeasure is not present or is not sufficient, what remains? Vulnerability Exposure Risk Penetration
Vulnerability