Security Module 8 Flashcards
Which of the following is designed to address security weaknesses of Telnet?
SSH
Why will IPv6 eventually replace IPv4?
IPv4 has run out of unique addresses for all the devices on the internet
Which of the following is a defensive measure used to specifically prevent a DDOS?
Flood Guard
Which protocol can be used to perform a Smurf attack?
ICMP
If a packet has an internal IP address but the traffic is coming from the outside, this is an indication of which of the following?
The address has been spoofed
What is the first step in the DNS lookup process?
Examine the host table
How is a switching loop a possibility in a network?
Layer 2 switch headers do not have a TTL vaule
Which of the following allows a network device too= be managed and configured by SNMP?
Read-write community string
Which of the following is a security threat that should be addressed through VLAN configurations?
Default VLAN names
How does NBT protocol integrate with modern systems?
Allows NetBIOS to run over a TCP/IP network
Which of the following best describes the Ping of Death?
An ICMP packet that is larger than the valid size of an IP packet is sent to the victim’s PC
Which of the following is NOT a medium to connect to an FTP server?
Mapped network drive
Which technology can prevent DNS poisoning in a DNS namespace?
BIND
Which medium does iSCSI transfer data over?
IP network
How does FTP transfer data?
Using TCP port 20