This action might not be possible to undo. Are you sure you want to continue?
Flood guards are found in Firewalls, but not in Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). b. An attacker sends SYN segments with modified source addresses in IP Packets to the target server. c. Flood Guard controls a device's tolerance for unanswered service requests. d. A Syn Flood Attack is a form of Dos attack.
2 Marks: 2 Loop protection prevents a broadcast storm from crippling a network. Answer: True 3 Marks: 2 A typical configuration baseline would include each of the following except _______. Choose one answer. a. changing any default settings that are insecure b. performing a security risk assessment c. eliminating any unnecessary software d. enabling operating system security features
4 Marks: 2 _____ is the unauthorized access of information from a wireless device through a Bluetooth connection. Choose one answer. a. Bluetooth snatching b. Bluesnarfing c. Bluetooth spoofing d. Bluejacking e. Bluesmurfing
5 Marks: 2
Choose one answer. and financial fraudsters. Mobile computer device c. a. All of the above . It substitutes MAC addresses for IP addresses. Answer: True 6 Marks: 2 Which of the following is true about network address translation (NAT)? Choose one answer. b. a. c. GPS receiver d. a. It removes private addresses when the packet leaves the network. It can only be found on core routers.An advantage of WPA over WEP is that it dynamically generates a new key for each packet that is created. Spies b. Hackers d. Wireless NIC adapter b. Script kiddies c. 7 Marks: 2 _____ are a network of attackers. It can be stateful or stateless. Because of this there are 280 trillion possible keys that can be generated for any given packet. a. Antennas 9 Marks: 2 Which of the following is not an attack that uses ICMP Choose one answer. d. identity thieves. Cybercriminals 8 Marks: 2 Which of the following is not a requirement for war driving? Choose one answer.
b. None of the above 10 Marks: 2 Which of the following is a valid reason for not installing operating system patches on production computers as soon as the vendor releases them. ICMP Redirect Attack e. Vendors charge too much for patches. Vendor patches can introduce new operating system bugs that may interfere with applications running on the patched systems. a. Smurf DoS Attack d. V3 d. Choose one answer. a. V4 c. 11 Marks: 2 In a network using IEEE 802.1x. V2 . Vendors seldom understand the true threat from viruses. Ping of Deah Attack c. d. Vendor patches often contain virus that can infect systems. Answer: supplicant 12 Marks: 2 A vulnerability scan is usually performed outside of the security perimeter. V5 b. c. Choose one answer.b. Arp Poison Attack f. It is better to take your chances using good security measures to protect your systems. Answer: True False 13 Marks: 2 Which version of the Simple Network Management Protocol is considered the most secure. a ____________ makes a request to the authenticator.
Answer: True False 15 Marks: 2 Select the statement that best describes the firewall. Technical obsolescence Theft Software Attacks Natural disasters Intellectual property compromise Hardware failure or errors Espionage Sabotage or vandalism Program does not function on new operating system Desktop system is stolen from unlocked room Bug prevents program from properly loading Fire. a.14 Marks: 2 Active Directory allows for a single security related configuration to be set and then deployed to many or all users. Relies on user action to spread b. or eathquake destroys data Softw are is pirated or copyright is infringed Firew all blocks all netw ork traffic Spy steals new product plans Attacker implants a w orm that deletes files . None of the above f. All of the above e. A Firewall Appliance A Firewall Program is usually located outside of the security perimeter. Viruses are spread by transferring infected files c. is usually located on the host PC. Flood. 16 Marks: 2 Which is not true of viruses. Virus cannot automatically spread to another computer d. Viruses are attached to files 17 Marks: 2 Match the following threat category with the examples that best fit. Choose one answer.
Security Analyst d. Chief Information Security Officer (CISO) e. A lock that can be used to secure a mobile device. A lock that extends a solid metal bar into the door frame for extra security. a. closed d. Choose one answer. open c. Answer: True False 20 Marks: 2 Each of the following is a state of a port that can be returned by a port scanner except _____. Security Manager 22 . Chief Executive Officer (CEO) c. The residential lock most often used for keeping out intruders. Security Administrator b. a. Choose one answer. blocked b. busy 21 Marks: 2 The _____ is primarily responsible for assessment.Utility interruption Electrical pow er is cut off 18 Marks: 2 Match the following statements with the correct lock type. management. Keyed Entry Lock Deadbolt Lock Cable Lock 19 Marks: 2 A honeypot cannot be part of a honeynet. and implementation of security.
A type of pizza. a. Proxies . are often called ______. A Personal Area Network c. A Protocol Agnostic Network d. as in personal pan pizza 24 Marks: 2 User Rights is a Microsoft Windows setting that can be configured through a security template. Choose one answer. None of the above f. Answer: True False Question 25 Marks: 2 The three types of information protection. A Protocol Authentication Node b.Marks: 2 A demilitarized zone (DMZ) contains and helps protect computers on the internal core network. VPN Concentraters d. Integrity and Availability. Confidentiality. a. Web Security Gateways c. All of the above e. Answer: True False 23 Marks: 2 A PAN is Choose one answer. Firewalls b. Answer: CIA 26 Marks: 2 Which of the following are NOT considered network security devices.
Choose one answer. is a person or entity with the power to carry out a threat against an asse d. 28 Marks: 2 Match the Network Layer Model to the number layers in that model. b. Spam Filters i. The bytes of a virus are placed in different “piles” and then used to create a profile. does not include natural disasters b. a. a. A string of bytes from the virus is compared against the suspected file. c. is the manager for a professional hacker . By creating a virualized environment and executing the suspect program code in it. Intrusion Detection and Preventions Systems 27 Marks: 2 How does heuristic detection anti-virus software such as Avast help you avoid becoming infected by a computer virus? Choose one answer. d. The TCP/IP Model The OSI Model 4 7 29 Marks: 2 A worm sends copies of itself to other network devices. Internet Content Filters h. The virus signature file is placed in a suspended chamber before streaming to the CPU. is limited to attacks using viruses and worms c. Answer: True False 30 Marks: 2 A threat agent _____.g.
White box b. then she is using which technique? Choose one answer. on the user's PC. b.e. on the POP3 server. 32 Marks: 2 Erin pretends to be a manager from another city and calls Nick to trick him into giving to her his password. network diagrams. a. Aliasing c. c. Gray box 34 Marks: 2 The wide acceptance and use of network address translation (NAT) was the primary reason we did not run out of IP Addresses a long time ago. a. Impersonation d. on the email webserver. Answer: True False . d. and source code of customer applications. Black box c. What social engineering attack has Erin performed? Choose one answer. a. Luring 33 Marks: 2 If a tester is given the IP addresses. Duplicity b. on the SMTP server. Blue Box d. is something that cannot be determined in advance 31 Marks: 2 The optimum place to install a spam filter is: Choose one answer.
Erase all data if John Smith’s name is removed from the list of employees b. DNS poisoning d. DNS replay b. can be prevented by patching the Web browser b. Choose one answer. If the company’s stock price drops below $10 then credit Jeff Brown with ten additional years of retirement credit 36 Marks: 2 Which of the following Domain Name System (DNS) attacks replaces a fraudulent IP address for a symbolic name? Choose one answer. makes a copy of the transmission for use at a later time 38 Marks: 2 Please match the following: Asset Threat agent Item of value Element w ith pow er to carry out a threat . is considered to be a type of DoS attack c. DNS masking 37 Marks: 2 A replay attack ___________ Choose one answer. a.35 Marks: 2 Each of the following could be a logic bomb except _______. DNS forwarding c. a. replays the attack over and over to flood the server d. Reformat the hard drive three months after Susan Jones left the company d. Send spam e-mail to all users c. a.
SIDS c. Scrapware c. Interceptor b. a. Pullware 41 Marks: 2 _____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information and to protect all electronic and paper containing personally identifiable financial information. a. Adware b. Spyware d. California Savings and Loan Security Act (CS&LSA) d. a. USA Patriot Act c.Threat Actions or events that have potential to cause harm 39 Marks: 2 What type of attack intercepts legitimate communication and forges a fictitious response to the sender? Choose one answer. Man in the middle d. SQL intrusion 40 Marks: 2 _____ is a general term used for describing software that gathers information without the user’s consent. Sarbanes-Oxley Act (Sarbox or Sox) 42 . Gramm-Leach-Bliley Act (GLBA) b. Choose one answer. Choose one answer.
Choose one answer. 802. Flash the ROM BIOS e. Reformat the hard drive and reload the operating system. 802.Marks: 2 What is unique about a cross site scripting (XSS) attack compared to other injection attacks? Choose one answer. a. XSS requires the use of a browser b.11g b. Erase and reinstall all files in the WINDOWS folder d.11b d.11 c. a. SQL code is used in an XSS attack d. XSS attacks are rarely used anymore compared to other injection attacks c. Rebuild the master boot record (MBA) c. 44 Marks: 2 The IEEE _____ standard specifies a maximum rated speed of 54 Mbps using the 5 GHz spectrum. XSS does not attack the Web application server to steal or corrupt its information 43 Marks: 2 To be completely sure you've removed a rootkit from a computer you should _______. a. surprise . Run a thorugh virus scan on the infected machine b.11a 45 Marks: 2 A _____ attack exploits previously unknown vulnerabilities. Choose one answer. 802. Choose one answer. 802. virus resource b. a.
a. shock and awe d. Choose one answer. Choose one answer. redirect cookie 48 Marks: 2 A _____ requires a user to transport it from one computer to another. modify security settings d. worm 49 Marks: 2 Each of the following is an advantage of IEEE 802. Trojan d. second party cookie b.c. Choose one answer. virus c. third party cookie c. a. chocolate chip cookie e. zero day 46 Marks: 2 After an attacker probes a network for information the next logical step is to _______. . a. rootkit b. circulate to other systems 47 Marks: 2 A cookie that was not created by the Web site being viewed is called a ___________. penetrate any defenses c. paralyze networks and devices b. Choose one answer.11n except _______. silent cookie d.
802.11a d. less interference 50 Marks: 2 Wi-Fi Protected Access 2 (WPA2) is based on the IEEE 802. 802. stronger security d. a.11_ standard ratified in June 2004. 802. 802.11g b. smaller coverage area c.11b c. Choose one answer. faster speed b.11i .a. 802.11x e.
circulate to other systems 47 Marks: 2 A cookie that was not created by the Web site being viewed is called a ___________. Choose one answer. silent cookie d. virus resource b. chocolate chip cookie e. surprise c. penetrate any defenses c. a. Choose one answer. a. a. third party cookie c.Marks: 2 A _____ attack exploits previously unknown vulnerabilities. paralyze networks and devices b. redirect cookie 48 Marks: 2 . zero day 46 Marks: 2 After an attacker probes a network for information the next logical step is to _______. modify security settings d. Choose one answer. second party cookie b. shock and awe d.
stronger security d. faster speed b.11g b. smaller coverage area c. 802.11a d. a.A _____ requires a user to transport it from one computer to another. Choose one answer.11n except _______. 802. virus c. worm 49 Marks: 2 Each of the following is an advantage of IEEE 802. 802.11b c.11x e. a. 802. Choose one answer. Choose one answer. 802.11i .11_ standard ratified in June 2004. rootkit b. Trojan d. a. less interference 50 Marks: 2 Wi-Fi Protected Access 2 (WPA2) is based on the IEEE 802.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.