quiz 3 Flashcards

1
Q

Security devices on a network process digital information, such as text files and Web
pages, in the same way. However, which of the following pieces of information might
they handle differently?
Question 1 options:

attack signatures

protocols

port numbers

TCP/IP headers

A

attack signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which of the following situations can CVE improve the coordination of intrusion
information on a network?
Question 2 options:

Attack signatures can be compared to current network topology.

Current network vulnerabilities can be used to generate application patches.

Attack signatures can be compared to lists of known attack signatures on the CVE Web site.

Installing application patches can thwart a reported attack.

A

Installing application patches can thwart a reported attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can be included in a network traffic signature? (Choose all
that apply.)
Question 3 options:

A) Ethernet interface number

B) TCP options

C) message digest

D) logon attempts

A

B) TCP options

D) logon attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the name of an error-checking procedure that uses a formula to calculate a
numeric value?
Question 4 options:

hexadecimal code

check string

one-way hash

checksum

A

checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do attackers use fragmentation to circumvent network defenses? (Choose all
that apply.)
Question 5 options:

A) The fragments arrive too slowly.

B) The initial packet is missing.

C) The final fragment sent is less than 400 bytes long.

D) Fragments are crafted to be too large or too small.

A

A) The fragments arrive too slowly.

B) The initial packet is missing.

D) Fragments are crafted to be too large or too small.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following packets should never have a data payload?
a.
b.
c.
d.
Question 6 options:

one with the SYN flag set

one with ACK/PSH flags set

one with the ACK flag set

one with SYN/ACK flags set

A

one with the SYN flag set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not required for a single-packet attack?
Question 7 options:

a source IP address

an established connection

an ICMP echo request

a destination IP address

A

an established connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of a multiple-packet attack?
Question 8 options:

a false Internet time stamp

an ICMP flood

a packet with SYN/FIN/ACK flags set

a fragment

A

an ICMP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of the 4-byte acknowledgement number in a TCP header?
Question 9 options:

It acknowledges that a connection has been made.

It acknowledges receipt of the previous packet in the sequence.

It verifies that the source and destination IP addresses are correct.

It acknowledges the ID number the packet is using.

A

It acknowledges receipt of the previous packet in the sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the correct order in which TCP flags appear during the
initiation of a normal connection?
a.
b.
c.
d.
Question 10 options:

SYN, PSH, ACK, FIN

SYN, ACK, FIN, RST

SYN, PSH, ACK, RST

SYN, SYN/ACK, ACK

A

SYN, SYN/ACK, ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which protocol uses one port number to establish a connection and a different port
number to transfer data?
Question 11 options:

ICMP

TCP/IP

FTP

HTTP

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an example of a reconnaissance traffic signature?
Question 12 options:

denial of service

Ping of Death

ping sweep

Trojan program

A

ping sweep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which program keeps track of services and ports made available through Remote
Procedure Calls?
Question 13 options:

Network File Sharing

Network Information System

Network File System

portmapper

A

portmapper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

To avoid attacks that use advanced evasion techniques, such as path obfuscation,
CGI scripts, and packet injection, you must do which of the following? (Choose all
that apply.)
Question 14 options:

A) Install additional IDPS sensors.

B) Keep your IDPS signature files updated.

C) Keep your anti-adware software updated.

D) Watch your log files closely.

A

B) Keep your IDPS signature files updated.

D) Watch your log files closely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following features distinguishes IPv6 from IPv4?
Question 15 options:

IPv6 fragmentation occurs only at the source node.

IPv4 is unfragmentable.

The IPv4 maximum fragment size is larger than its IPv6 counterpart.

IPv6 fragmentation occurs on IPv6-compliant routers.

A

IPv6 fragmentation occurs only at the source node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly