Question
Chapter 19 Protecting Your Network 1. Which term is sometimes used to describe the people who carry out network threats? A. Worm catcher B. Threat
Chapter 19
Protecting Your Network
1. Which term is sometimes used to describe the people who carry out network threats?
A. Worm catcher
B. Threat agent
C. Vulnerability analyst
D. Trojan horse
2. Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?
A. DDoS
B. Smurf attack
C. Phishing
D. DHCP snooping
3. Which term refers to a single computer under the control of an operator?
A. DDoS
B. Smurf attack
C. Phishing
D. Zombie
4. Which tool watches for and ignores incoming DHCP requests from unknown MAC addresses?
A. TEMPEST
B. DHCP snooping
C. NMap
D. RF emanation
5. ARP poisoning is a common method for __________ attacks.
A. DDoS
B. phishing
C. man in the middle
D. smurf
6. Which type of attack involves the attacker tapping into communications between two systems?
A. Phishing
B. Malware
C. Man in the middle
D. Leeching
7. Which term refers to trying every permutation of some form of data in an attempt to discover protected information?
A. Brute force
B. RF emanation
C. Amplification
D. Reflection
8. Installing backup power in case of electrical failure is a form of __________.
A. firewall
B. DMZ
C. redundancy
D. inheritance
9. Which term describes a technology that spreads data across multiple drives?
A. Inheritance
B. Macro
C. RAID
D. Honeypot
10. One of the first techniques that malicious users try is to probe hosts to identify any __________ ports.
A. open
B. closed
C. blocked
D. locked
11. Which term refers to the administrative account native to Linux?
A. Administrator
B. Admin
C. Root
D. Supervisor
12. Which type of malware replicates exclusively through networks?
A. Rootkit
B. Worm
C. Macro
D. Trojan
13. Which type of malware looks or pretends to do one thing while, at the same time, doing something evil?
A. Rootkit
B. Worm
C. Macro
D. Trojan
14. Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?
A. Rootkit
B. Worm
C. Macro
D. Trojan horse
15. Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?
A. Spyware
B. Adware
C. Macro
D. Trojan Horse
16. Which term refers to an aspect of any program that sends information about your system or your actions over the Internet?
A. Spyware
B. Adware
C. Macro
D. Trojan Horse
17. Which type of attack is a form of social engineering?
A. Denial of Service
B. Smurf attack
C. Phishing
D. Zombie
18. What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?
A. Leeching
B. HTTPS
C. DMZ
D. TEMPEST
19. Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.
A. unified threat management (UTM)
B. multifactor authentication
C. biometric devices
D. inheritance
20. Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.
A. shared
B. public
C. unique
D. common
21. IP cameras and __________ are specific implementations of video monitoring.
A. voice analyzers
B. RFID chips
C. closed-circuit televisions
D. access control lists
22. Cisco uses what it calls __________ as one of its tools to implement network admission control.
A. stateless inspection
B. botnets
C. posture assessment
D. persistent agent
23. What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?
A. Inbound agent
B. Persistent agent
C. Private agent
D. Non-persistent agent
24. Your first and last bastion of defense for your entire infrastructure's security is at the individual __________.
A. NICs
B. ports
C. hosts
D. user accounts
25. Which term refers to a system with very high network output?
A. Host
B. Honeypot
C. Top talker
D. Demilitarized zone
26. What are the most common symptoms of malware on a compromised system?
A. General sluggishness and random messages
B. Random messages and blank screen
C. General sluggishness and random crashes
D. Dropping Internet connection and intermittent blank screens
27. Which type of firewall is built into most consumer-grade routers?
A. A Host-based firewall
B. A Small office/home office (SOHO) firewall
C. A Software-based firewall
D. A Windows Firewall
28. Which type of firewall packet inspection is aware is aware of the packet's state, as it relates to other packets?
A. Stateful
B. Stateless
C. Port
D. Filtered
29. Which type of firewall packet inspection inspects each packet fresh, with no regard to the state of the packet's relation to any other packet?
A. Stateful
B. Stateless
C. Port
D. Filtered
30. Which technology consists of devices or software that protect an internal network from unauthorized access by acting as a filter?
A. Ports
B. Demilitarized zones
C. Honeypots
D. Firewalls
31. An access control list (ACL) is a rule applied to an interface that allows or denies traffic based on things like source or __________.
A. destination filtering
B. MAC addresses
C. network address translation
D. destination IP addresses
32. Which technology provides critical filtering to keep traffic flowing where it should and prohibiting traffic in areas where traffic should not flow?
A. ARP cache poisoning
B. Demilitarized zone
C. RF emanation
D. Access control list (ACL)
33. Access control lists (ACLs) consider traffic as either __________.
A. encrypted or unencrypted
B. private or public
C. persistent or non-persistent
D. inbound or outbound
34. A(n) __________ can consist of an external firewall and an internal firewall.
A. demilitarized zone (DMZ)
B. honeypot
C. posture assessment
D. quarantine network
35. Which firewall comes in and sits between publicly accessible servers and the trusted network that houses all the organizations private serves and workstations?
A. The external firewall
B. The internal firewall
C. The proxy server
D. The access control list
--- END CHAPTER 19 ---
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started