Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Chapter 19 Protecting Your Network 1. Which term is sometimes used to describe the people who carry out network threats? A. Worm catcher B. Threat

Chapter 19

Protecting Your Network

1. Which term is sometimes used to describe the people who carry out network threats?

A. Worm catcher

B. Threat agent

C. Vulnerability analyst

D. Trojan horse

2. Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?

A. DDoS

B. Smurf attack

C. Phishing

D. DHCP snooping

3. Which term refers to a single computer under the control of an operator?

A. DDoS

B. Smurf attack

C. Phishing

D. Zombie

4. Which tool watches for and ignores incoming DHCP requests from unknown MAC addresses?

A. TEMPEST

B. DHCP snooping

C. NMap

D. RF emanation

5. ARP poisoning is a common method for __________ attacks.

A. DDoS

B. phishing

C. man in the middle

D. smurf

6. Which type of attack involves the attacker tapping into communications between two systems?

A. Phishing

B. Malware

C. Man in the middle

D. Leeching

7. Which term refers to trying every permutation of some form of data in an attempt to discover protected information?

A. Brute force

B. RF emanation

C. Amplification

D. Reflection

8. Installing backup power in case of electrical failure is a form of __________.

A. firewall

B. DMZ

C. redundancy

D. inheritance

9. Which term describes a technology that spreads data across multiple drives?

A. Inheritance

B. Macro

C. RAID

D. Honeypot

10. One of the first techniques that malicious users try is to probe hosts to identify any __________ ports.

A. open

B. closed

C. blocked

D. locked

11. Which term refers to the administrative account native to Linux?

A. Administrator

B. Admin

C. Root

D. Supervisor

12. Which type of malware replicates exclusively through networks?

A. Rootkit

B. Worm

C. Macro

D. Trojan

13. Which type of malware looks or pretends to do one thing while, at the same time, doing something evil?

A. Rootkit

B. Worm

C. Macro

D. Trojan

14. Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?

A. Rootkit

B. Worm

C. Macro

D. Trojan horse

15. Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?

A. Spyware

B. Adware

C. Macro

D. Trojan Horse

16. Which term refers to an aspect of any program that sends information about your system or your actions over the Internet?

A. Spyware

B. Adware

C. Macro

D. Trojan Horse

17. Which type of attack is a form of social engineering?

A. Denial of Service

B. Smurf attack

C. Phishing

D. Zombie

18. What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?

A. Leeching

B. HTTPS

C. DMZ

D. TEMPEST

19. Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.

A. unified threat management (UTM)

B. multifactor authentication

C. biometric devices

D. inheritance

20. Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

A. shared

B. public

C. unique

D. common

21. IP cameras and __________ are specific implementations of video monitoring.

A. voice analyzers

B. RFID chips

C. closed-circuit televisions

D. access control lists

22. Cisco uses what it calls __________ as one of its tools to implement network admission control.

A. stateless inspection

B. botnets

C. posture assessment

D. persistent agent

23. What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?

A. Inbound agent

B. Persistent agent

C. Private agent

D. Non-persistent agent

24. Your first and last bastion of defense for your entire infrastructure's security is at the individual __________.

A. NICs

B. ports

C. hosts

D. user accounts

25. Which term refers to a system with very high network output?

A. Host

B. Honeypot

C. Top talker

D. Demilitarized zone

26. What are the most common symptoms of malware on a compromised system?

A. General sluggishness and random messages

B. Random messages and blank screen

C. General sluggishness and random crashes

D. Dropping Internet connection and intermittent blank screens

27. Which type of firewall is built into most consumer-grade routers?

A. A Host-based firewall

B. A Small office/home office (SOHO) firewall

C. A Software-based firewall

D. A Windows Firewall

28. Which type of firewall packet inspection is aware is aware of the packet's state, as it relates to other packets?

A. Stateful

B. Stateless

C. Port

D. Filtered

29. Which type of firewall packet inspection inspects each packet fresh, with no regard to the state of the packet's relation to any other packet?

A. Stateful

B. Stateless

C. Port

D. Filtered

30. Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?

A. Ports

B. Demilitarized zones

C. Honeypots

D. Firewalls

31. An access control list (ACL) is a rule applied to an interface that allows or denies traffic based on things like source or __________.

A. destination filtering

B. MAC addresses

C. network address translation

D. destination IP addresses

32. Which technology provides critical filtering to keep traffic flowing where it should and prohibiting traffic in areas where traffic should not flow?

A. ARP cache poisoning

B. Demilitarized zone

C. RF emanation

D. Access control list (ACL)

33. Access control lists (ACLs) consider traffic as either __________.

A. encrypted or unencrypted

B. private or public

C. persistent or non-persistent

D. inbound or outbound

34. A(n) __________ can consist of an external firewall and an internal firewall.

A. demilitarized zone (DMZ)

B. honeypot

C. posture assessment

D. quarantine network

35. Which firewall comes in and sits between publicly accessible servers and the trusted network that houses all the organizations private serves and workstations?

A. The external firewall

B. The internal firewall

C. The proxy server

D. The access control list

--- END CHAPTER 19 ---

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Objects And Databases International Symposium Sophia Antipolis France June 13 2000 Revised Papers Lncs 1944

Authors: Klaus R. Dittrich ,Giovanna Guerrini ,Isabella Merlo ,Marta Oliva ,M. Elena Rodriguez

2001st Edition

3540416641, 978-3540416647

More Books

Students also viewed these Databases questions

Question

CX 0 7 CX 0 7

Answered: 1 week ago

Question

Give a scenario where the permutations rule applies.

Answered: 1 week ago