Security Module 8 Flashcards

1
Q

Which of the following is designed to address security weaknesses of Telnet?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why will IPv6 eventually replace IPv4?

A

IPv4 has run out of unique addresses for all the devices on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is a defensive measure used to specifically prevent a DDOS?

A

Flood Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol can be used to perform a Smurf attack?

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If a packet has an internal IP address but the traffic is coming from the outside, this is an indication of which of the following?

A

The address has been spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first step in the DNS lookup process?

A

Examine the host table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is a switching loop a possibility in a network?

A

Layer 2 switch headers do not have a TTL vaule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following allows a network device too= be managed and configured by SNMP?

A

Read-write community string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a security threat that should be addressed through VLAN configurations?

A

Default VLAN names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does NBT protocol integrate with modern systems?

A

Allows NetBIOS to run over a TCP/IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following best describes the Ping of Death?

A

An ICMP packet that is larger than the valid size of an IP packet is sent to the victim’s PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT a medium to connect to an FTP server?

A

Mapped network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which technology can prevent DNS poisoning in a DNS namespace?

A

BIND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which medium does iSCSI transfer data over?

A

IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does FTP transfer data?

A

Using TCP port 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a VoIP system different from IP telephony?

A

VoIP technology uses IP telephony

17
Q

Which of the following is most likely to use Secure Copy Protocol?

A

UNIX and Linux system

18
Q

How is FTPS more secure than FTP?

A

FTPS uses SSL

19
Q

When using FTP active mode, which command is sent to the server?

A

PORT

20
Q

What is the value of a checksum?

A

Verification of integrity