ISEC Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the maximum value for any octet in an IPv4 IP address?

255

What is NOT a typical sign of virus activity on a system?

??? Unexpected error messages Unexplained decrease in available disk space Sudden sluggishness of applications Unexpected power failures

Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security vulnerabilities into a network while still meeting business requirements?

Applying security updates promptly

What protocol is responsible for assigning IP addresses to hosts on most networks?

Dynamic Host Configuration Protocol (DHCP)

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?

Evil twin

T/F: A VPN router is a security appliance that is used to filter IP packets.

F

T/F: Bricks-and-mortar stores are completely obsolete now.

F

Brian would like to conduct a port scan against his systems to determine how they look from an attacker's viewpoint. What tool can he use for this purpose?

Nmap

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

Payment Card Industry Data Security Standard (PCI DSS)

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?

Procedure

Which tool can capture the packets transmitted between systems over a network?

Protocol analyzer

What type of malicious software allows an attacker to remotely control a compromised computer?

Remote Access Tool (RAT)

Users throughout Alison's organization have been receiving unwanted commercial messages over the organization's instant messaging program. What type of attack is taking place?

Spim

IoT technology has a significant impact on developing economies, given that it can transform countries into e-commerce-ready nations.

T

T/F: A DoS attack is a coordinated attempt to deny service by occupying a computer to perform large amounts of unnecessary tasks.

T

T/F: A firewall is a basic network security defense tool.

T

T/F: A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.

T

T/F: A network protocol governs how networking equipment interacts to deliver data across the network.

T

T/F: Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user.

T

T/F: Backdoor programs are typically more dangerous than computer viruses.

T

T/F: Bring Your Own Device (BYOD) opens the door to considerable security issues.

T

T/F: Cars that have Wi-Fi access and onboard computers require software patches and upgrades from the manufacturer.

T

T/F: In e-business, secure web applications are one of the critical security controls that each organization must implement to reduce risk.

T

T/F: Metadata of Internet of Things (IoT) devices can be sold to companies seeking demographic marketing data about users and their spending habits.

T

T/F: Networks, routers, and equipment require continuous monitoring and management to keep wide area network (WAN) service available.

T

T/F: Spyware gathers information about a user through an Internet connection, without his or her knowledge.

T

T/F: TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model.

T

T/F: The Data Link Layer of the OSI Reference Model is responsible for transmitting information on computers connected to the same local area network (LAN).

T

T/F: The System/Application Domain holds all the mission-critical systems, applications, and data.

T

T/F: The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.

T

T/F: Unlike viruses, worms do NOT require a host program in order to survive and replicate.

T

T/F: When servers need operating system upgrades or patches, administrators take them offline intentionally so they can perform the necessary work without risking malicious attacks.

T

Which one of the following is an advantage that the Internet of Things (IoT) brings to economic development for countries?

Technical and industry development

Which term describes any action that could damage an asset?

Threat

Which classification level is the highest level used by the U.S. federal government?

Top Secret

Florian recently purchased a set of domain names that are similar to those of legitimate websites and used the newly purchased sites to host malware. Which type of attack is Florian using?

Typosquatting

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use?

Virtual LAN (VLAN)

What type of network connects systems over the largest geographic area?

Wide area network (WAN)

What wireless security technology contains significant flaws and should never be used?

Wired Equivalent Privacy (WEP)

Juan's web server was down for an entire day last September. It experienced no other downtime during that month. Which one of the following represents the web server uptime for that month?

96.67%

T/F: A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

F

T/F: A phishing attack "poisons" a domain name on a domain name server.

F

T/F: A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.

F

T/F: A worm is a self-contained program that has to trick users into running it.

F

T/F: Connectivity is one of the five critical challenges that the Internet of Things (IoT) has to overcome.

F

T/F: Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure web pages.

F

T/F: IP addresses are assigned to computers by the manufacturer.

F

T/F: Implicit deny is when firewalls look at message addresses to determine whether a message is being sent around an unending loop.

F

T/F: IoT devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

F

T/F: Spyware does NOT use cookies.

F

T/F: The auto industry has not yet implemented the Internet of Things (IoT).

F

T/F: The main difference between a virus and a worm is that a virus does not need a host program to infect.

F

T/F: Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.

F

T/F: Vishing is a type of wireless network attack.

F

Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?

Polymorphic virus

What type of network device normally connects directly to endpoints and uses MAC-based filtering to limit traffic flows?

Switch

T/F: A IT security policy framework is like an outline that identifies where security controls should be used.

T

T/F: A computer virus is an executable program that attaches to, or infects, other executable programs.

T

T/F: A phishing email is a fake or bogus email intended to trick the recipient into clicking on an embedded URL link or opening an email attachment.

T

T/F: A successful denial of service (DoS) attack may create so much network congestion that authorized users cannot access network resources.

T

T/F: A wireless access point (WAP) is the connection between a wired and wireless network.

T

T/F: Access control lists (ACLs) are used to permit and deny traffic in an IP router.

T

T/F: Application service providers (ASPs) are software companies that build applications hosted in the cloud and on the Internet.

T

T/F: Attacks against confidentiality and privacy, data integrity, and availability of services are all ways malicious code can threaten businesses.

T

T/F: Defense in depth is the practice of layering defenses to increase overall security and provide more reaction time to respond to incidents.

T

T/F: E-commerce systems and applications demand strict confidentiality, integrity, and availability (CIA) security controls.

T

T/F: Encrypting the data within databases and storage devices gives an added layer of security.

T

T/F: For businesses and organizations under recent compliance laws, data classification standards typically include private, confidential, internal use only, and public domain categories.

T

T/F: Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.

T

T/F: It is common for rootkits to modify parts of the operating system to conceal traces of their presence.

T

T/F: Organizations should start defining their IT security policy framework by defining an asset classification policy.

T

T/F: Rootkits are malicious software programs designed to be hidden from normal methods of detection.

T

T/F: Simple Network Management Protocol (SNMP) is used for network device monitoring, alarm, and performance.

T

T/F: Some vending machines are equipped with a cellular phone network antenna for secure credit card transaction processing.

T

T/F: The function of homepage hijacking is to change a browser's homepage to point to the attacker's site.

T

T/F: The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

T

T/F: The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.

T


Conjuntos de estudio relacionados

Chapter 6 | Configuring Basic Switch Management (quiz)

View Set

Ch. 36 - Abdominal and Genitourinary Trauma

View Set

History of Rock and Roll Chapter 6 (Motown)

View Set