Security+ - Quiz 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

___________________ is an attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.

Disassociation

Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?

Evil Twin

Which of the following devices are the first line of defense for networks connected to the Internet?

Firewalls

Which of the following is not a routing protocol?

ICMP

Which authentication method uses a key distribution center (KCD)?

Kerberos

Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?

Mandatory Access Control (MAC)

Whether your server operating system can force the change of a password is considered what kind of a security issue?

Operational

A firewall operating as a ___________________ firewall will pass or block packets based on their application or TCP port number.

Packet filter

Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.

TACACS+


Conjuntos de estudio relacionados

Module 5 General Business Law - Contracts, Intellectual Property, Employment, Liability, Regulation

View Set

Test 3 - Otitis media and conjunctivitis

View Set

Management Chapter 4 Practice Questions

View Set

16th Century Northern Europe III: England, 16th Century Northern Europe II: Spain, Portugal, and the Netherlands, Art Chinese and korean., Japanese art

View Set