Chapter 5 & 6 Review Questions

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

1. Isabella is a security support manager for a large enterprise. In a recent meeting, she was asked which of the standard networking devices already present on the network could be configured to supplement the specific network security hardware devices that were recently purchased. Which of these standard networking devices would Isabella recommend? A. router B. hub C. virtual private network D. SIEM device

A

12. Which of these is NOT used in scheduling a load balancer? A. The IP address of the destination packet B. Data within the application message itself C. Round-robin D. Affinity

A

13. In which of the following configurations are all the load balancers always active? A. Active-active B. Active-passive C. Passive-active-passive D. Active-load-passive-load

A

14. Which device intercepts internal user requests and then processes those requests on behalf of the users? A. Forward proxy server B. Reverse proxy server C. Host detection server D. Intrusion prevention device

A

15. Raul was asked to configure the VPN to preserve bandwidth. Which configuration would he choose? A. Split tunnel B. Full tunnel C. Narrow tunnel D. Wide tunnel

A

3. Newton is concerned that attackers could be exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. What type of attack is he worried about? A. Privilege escalation B. Session replay C. Scaling exploit D. Amplification

A

5. An attacker who manipulates the maximum size of an integer type would be performing what kind of attack? A. integer overflow B. buffer overflow C. number overflow D. heap overflow

A

5. Which function does an Internet content filter NOT perform? A. intrusion detection B. URL filtering C. malware inspection D. content inspection

A

6. What kind of attack is performed by an attacker who takes advantage of the inadvertent and unauthorized access built through three succeeding systems that all trust one another? A. privilege escalation B. cross-site attack C. horizontal access attack D. transverse attack

A

7. Francisco was asked by a student intern to explain the danger of a MAC flooding attack on a switch. What would Francisco say? A. Once the MAC address table is full the switch functions like a network hub. B. A MAC flooding attack with filter to the local host computer's MAC-to-IP address tables and prevent these hosts from reaching the network. C. In a defense of a MAC flooding attack network routers will freeze and not permit any incoming traffic. D. A MAC flooding attack will prevent load balances from identifying the correct VIP of the servers.

A

1. Which attack intercepts communications between a web browser and the underlying computer? A. man-in-the-middle (MITM) B. man-in-the-browser (MITB) C. replay D. ARP poisoning

B

10. Which attack uses the user's web browser settings to impersonate that user? A. XDD B. XSRF C. Domain hijacking D. Session hijacking

B

12. Which action cannot be performed through a successful SQL injection attack? A. discover the names of different fields in a table B. reformat the web application server's hard drive C. display a list of customer telephone numbers D. erase a database table

B

14. What type of attack involves manipulating third-party ad networks? A. Session advertising B. Malvertising C. Clickjacking D. Directory traversal

B

15. Why are extensions, plug-ins, and add-ons considered to be security risks? A. They are written in Java, which is a weak language. B. They have introduced vulnerabilities in browsers. C. They use bitcode. D. They cannot be uninstalled.

B

16. What is a session token? A. XML code used in an XML injection attack B. a random string assigned by a web server C. another name for a third-party cookie D. a unique identifier that includes the user's email address

B

16. Which device watches for attacks and sounds an alert only when one occurs? A. firewall B. network intrusion detection system (NIDS) C. network intrusion prevention system (NIPS) D. proxy intrusion device

B

17. Which of the following is a multipurpose security device? A. Hardware security module B. Unified Threat Management (UTM) C. Media gateway D. Intrusion Detection/Prevention (ID/P)

B

18. Which of the following CANNOT be used to hide information about the internal network? A. network address translation (NAT) B. a protocol analyzer C. a subnetter D. a proxy server

B

20. Which is the most secure type of firewall? A. stateless packet filtering B. stateful packet filtering C. network intrusion detection system replay D. reverse proxy analysis

B

4. Which of the following devices can identify the application that send packets and then make decisions about filtering based on it? A. Internet content filter B. application-based firewall C. reverse proxy D. web security gateway

B

6. How does network address translation (NAT) improve security? A. It filters based on protocol. B. It discards unsolicited packets. C. It masks the IP address of the NAT device. D. NATs do not improve security.

B

8. What is the difference between a DoS and a DDoS attack? A. DoS attacks are faster than DDoS attacks B. DoS attacks use fewer computers than DDoS attacks C. DoS attacks do not use DNS servers as DDoS attacks do D. DoS attacks user more memory than a DDoS attack

B

8. Which device is easiest for an attacker to take advantage of to capture and analyze packets? A. router B. hub C. switch D. load balancer

B

9. John was explaining about an attack that accepts user input without validating it and uses that input in a response. What type of attack was he describing? A. SQL B. XSS C. XSRF D. DDoS DNS

B

9. Sebastian was explaining to his supervisor why the enterprise needed to implement port security. His supervisor asked what security action a flood guard could do when a MAC flooding attack occurred. Which of the following was NOT an answer that was given by Sebastian? A. Ignore the new MAC addresses while allowing normal traffic from the single pre-approved MAC address B. Cause the device to enter a fail-open mode. C. Record new MAC addresses up to a specific limit D. Block the port entirely

B

11. What is the basis of an SQL injection attack? A. to expose SQL code so that it can be examined B. to have the SQL server attack client web browsers C. to insert SQL statements through unfiltered user input D. to link SQL servers into a botnet

C

18. What type of attack intercepts legitimate communication and forges a fictitious response to the sender? A. SIDS B. interceptor C. MITM D. SQL intrusion

C

19. A replay attack _____. A. can be prevented by patching the web browser B. is considered to be a type of DoS attack C. makes a copy of the transmission for use at a later time D. replays the attack over and over to flood the server

C

19. What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)? A. A NIDS provides more valuable information about attacks. B. There is no difference; a NIDS and a NIPS are equal. C. A NIPS can take actions more quickly to combat an attack. D. A NIPS is much slower because it uses protocol analysis.

C

20. DNS poisoning _____. A. floods a DNS server with requests until it can no longer respond B. is rarely found today due to the use of host tables C. substitutes DNS addresses so that the computer is automatically redirected to another device D. is the same as ARP poisoning

C

3. Which of these would NOT be a filtering mechanism found in a firewall ACL rule? A. source address B. direction C. date D. protocol

C

4. Which of the following adds new functionality to the web browser so that users can play music, view videos, or display special graphical images within the browser? A. Extensions B. Scripts C. Plug-ins D. Add-ons

C

10. Which statement regarding a demilitarized zone (DMZ) is NOT true? A. It can be configured to have one or two firewalls. B. It typically includes an email or web server. C. It provides an extra degree of security. D. It contains servers that are used only by internal network users.

D

11. Which statement about network address translation (NAT) is true? A. It substitutes MAC addresses for IP addresses. B. It can be stateful or stateless. C. It can be found only on core routers. D. It removes private addresses when the packet leaves the network.

D

13. Attackers who register domain names that are similar to legitimate domain names are performing _____. A. Address resolution B. HTTP manipulation C. HTML squatting D. URL hijacking

D

17. Which of these is not a DoS attack? A. SYN flood B. DNS amplification C. smurf attack D. push flood

D

2. Olivia was asked to protect the system from a DNS poisoning attack. What are the locations she would need to protect? A. Web server buffer and host DNS server B. Reply referrer and domain buffer C. Web browser and browser add-on D. Host table and external DNS server

D

2. Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organization's secure intranet. Ximena explained to Sofia the problem associated with setting up the bridge. What did Ximena tell Sofia? A. A bridge will block packets between two different types of networks. B. A bridge cannot be used on any Internet connection. C. A bridge would block packets from reaching the Internet. D. A bridge could permit access to the secure wired network from the unsecured wireless network

D

7. Which statement is correct regarding why traditional network security devices cannot be used to block web application attacks? A. The complex nature of TCP/IP allows for too many ping sweeps to be blocked. B. Web application attacks use web browsers that cannot be controlled on a local computer. C. Network security devices cannot prevent attacks from web resources. D. Traditional network security devices ignore the content of HTTP traffic, which is the vehicle of web application attacks.

D


Kaugnay na mga set ng pag-aaral

Chapter 19: Accounting for Income Taxes

View Set

At Chapter 18. Gasoline Engine Operation, Parts, and Specifications

View Set

Barney Fletcher Exam questions 2

View Set

Computer Science ch. 5 Section 4: Database basics

View Set

MLT ASCP Practice Test Questions board practice

View Set