click below
click below
Normal Size Small Size show me how
Chap 9 and 10 Quiz
christ please help me with this.
Question | Answer |
---|---|
T/F: Different types of organizations have similar levels of network security risks. | False |
T/F: The term malware is derived from a combination of the words malicious and software. | True |
T/F: A hacker, in the original sense of the word, is someone with technical skill and malicious intent. | False |
T/F: The day after Patch Tuesday is informally dubbed Exploit Wednesday. | True |
T/F: A drop ceiling could be used by an intruder to gain access to a secured room. | True |
T/F: Over a long-distance connection, using SSH keys is more secure than using passwords. | True |
T/F: The original version of the Secure Hash Algorithm was developed by MIT. | False |
T/F: Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection. | True |
T/F: Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered. | True |
T/F: It is ideal to use the same password for multiple different applications, provided the password is complex enough. | False |
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes? | metasploit |
Which of the following statements correctly describes the malware characteristic of polymorphism? | Polymorphic malware can change its characteristics every time it is transferred to a new system. |
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware? | logic bomb |
Which of the following statements describes a worm? | A program that runs independently of other software and travels between computers and across networks. |
If multiple honeypots are connected to form a larger network, what term is used to describe the network? | honeynet |
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack? | man-in-the-middle attack |
Which of the following scenarios represents a phishing attempt? | An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access. |
In a red team-blue team exercise, what is the purpose of the blue team? | The blue team is charged with the defense of the network. |
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers? | Nessus |
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place? | quid pro quo |
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this? | tailgating |
In the typical social engineering attack cycle, what occurs at Phase 3? | The attacker exploits an action undertaken by the victim in order to gain access. |
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term? | principle of least privilege |
What statement regarding denial-of-service (DoS) attacks is accurate? | A denial-of-service attack prevents legitimate users from accessing normal network resources. |
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages? | DNS poisoning |
What is the Nmap utility used for? | It is a port scanning utility that can identify open ports on a host. |
How is a posture assessment performed on an organization? | A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised. |
What type of door access control is a physical or electronic lock that requires a code in order to open the door? | cipher lock |
An RFID label on a box is an example of what type of physical security detection method? | asset tracking tagging |
What statement regarding the different versions of the SHA hashing algorithm is accurate? | SHA-2 and SHA-3 both support the same hash lengths. |
On a Linux based system, what command can you use to create a hash of a file using SHA-256? | sha256sum |
Which command can be used on a Windows system to create a hash of a file? | Get-FileHash |
VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software? | mobile device management software |
A variant of BYOD, what does CYOD allow employees or students to do? | They can choose a device from a limited number of options. |
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found? | What document addresses the specific concerns related to special access given to administrators and certain support staff? |
Which of the following scenarios would necessitate the use of a non-disclosure agreement? | Your company needs to prevent a new contractor from sharing information with a potential competitor. |
How often should you require users to change their passwords? | every 60 days |
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS? | deauthentication attack |
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target? | distributed reflection denial-of-service attack |
T/F: Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. | True |
T/F: A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection. | False |
T/F: The Spanning Tree Protocol operates at the Network layer of the OSI model. | False |
T/F: The storm-control command is a type of flood guard that is available on most major network switch vendor platforms. | True |
T/F: User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders. | True |
T/F: Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options. | False |
T/F: By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos. | True |
T/F: When utilizing Kerberos, an access granting ticket is the same as a key. | False |
T/F: The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop. | True |
T/F: The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. | True |
Which of the following is an example of proxy server software? | Squid |
What is NOT a variable that an network access control list can filter traffic with? | The operating system used by the source or destination device. |
In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value? | 255.255.255.255 |
What kind of firewall can block designated types of traffic based on application data contained within packets? | content-filtering firewall |
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall? | iptables |
What is a SIEM (Security Information and Event Management) system utilized for? | It is a system used to evaluate data from security devices and generate alerts. |
When using Spanning Tree Protocol, what is the first step in selecting paths through a network? | STP must first select the root bridge, or master bridge. |
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs? | BPDU guard |
Which protocol designed to replace STP operates at Layer 3 of the OSI model? | Shortest Path Bridging (SPB) |
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use? | mac-limit |
Enforcing a virtual security perimeter using a client's geographic location is known by what term? | geofencing |
When using Kerberos, what is the purpose of a ticket? | It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated. |
Which legacy authentication protocol requires mutual authentication? | Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2) |
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer? | RADIUS |
Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel? | Protected EAP (PEAP) |
What IEEE standard includes an encryption key generation and management scheme known as TKIP? | 802.11i |
What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds? | Rapid Spanning Tree Protocol (RSTP) |
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished? | Use the switchport port-security command to enable MAC filtering. |
What aspect of AAA is responsible for determining what a user can and cannot do with network resources? | authorization |
What statement regarding role-based access control is accurate? | RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs. |
Which encryption standard was originally utilized with WPA's TKIP? | Rivest Cipher 4 (RC4) |
The Wired Equivalent Privacy standard had what significant disadvantage? | It used a shared encryption key for all clients, and the key might never change. |
In Open System Authentication, how does authentication occur? | The client "authenticates" using only the SSID name. In other words, no real authentication occurs. |
The Group Policy utility can be opened by typing what name into a Run box? | gpedit.msc |
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge? | Only one root port, which is the bridge's port that is closest to the root bridge, can forward. |
Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port? | port mirroring |
In regards to the use of local authentication, what statement is accurate? | Local authentication is network and server failure tolerant. |
What scenario might be ideal for the use of root guard in configuring a switch? | You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP. |
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change? | file integrity monitoring (FIM) |
What statement correctly describes a stateless firewall? | A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections. |