ECE Fund of Cybersecurity and Info Security: Ch 10 and 11

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What file type is least likely to be impacted by a file infector virus? .exe .dll .com .docx

.docx

What ISO security standard can help guide the creation of an organization's security policy? 12333 42053 27002 17259

27002

Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? Network address translation Packet filtering Stateful inspection Application proxying

Application proxying

What program, released in 2013, is an example of ransomware? BitLocker CryptoVault Crypt0L0cker FileVault

Crypt0L0cker

A smurf attack tricks users into providing logon information on what appears to be a legitimate website but is in fact a website set up by an attacker to obtain this information. True or False

False

What is NOT a common motivation for attackers? Fame Revenge Fear Money

Fear

Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues? Firewall Hub Switch Router

Hub

Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block? Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Hypertext Transfer Protocol (HTTP)

Internet Control Message Protocol (ICMP)

Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working? Application Data Link Presentation Session

Presentation

Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? Smurf Cross-site scripting (XSS) Land Teardrop

Smurf

A network protocol governs how networking equipment interacts to deliver data across the network. True or False

True

Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer. True or False

True

It is common for rootkits to modify parts of the operating system to conceal traces of their presence. True or False

True

What is NOT a typical sign of virus activity on a system? Unexplained decrease in available disk space Unexpected power failures Sudden sluggishness of applications Unexpected error messages

Unexpected power failures

Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use? Transport Layer Security (TLS) Firewall Virtual LAN (VLAN) Virtual private network (VPN)

Virtual LAN (VLAN)

Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity? 3G Digital subscriber line (DSL) Wi-Fi 4G

Wi-Fi

What wireless security technology contains significant flaws and should never be used? Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) WPA2 Remote Authentication Dial-In User Service (RADIUS)

Wired Equivalent Privacy (WEP)

Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database? SQL injection Cross-site scripting (XSS) XML injection LDAP injection

SQL injection

Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place? SQL injection XML injection Cross-site scripting Session hijacking

Session hijacking

Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication? 143 3389 443 80

443


Kaugnay na mga set ng pag-aaral

Ch. 29 Management of Patients with Nonmalignant Hematologic Disorders

View Set

Testout Chapter 05 Hardware Management

View Set

Accounting Managerial Cengage Quizzes

View Set