Network and Security Practice 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

what is IP spoofing?

A type of attack where the hacker's IP address appears to be a trusted IP address.

What is a proxy server?

A server that authenticates and makes request on behalf of another system on the network

In the context of IT security, wiretapping is considered:

A type of passive attack

What type of attack involves modifying network tables to associate the attacker's MAC address with the IP address of a legitimate user?

ARP Poisoning

A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend?

Application Firewall

An organization is deploying a sophisticated firewall that examines both individual packets and their collective grouping. What type of access control does this represent?

Context-based

The Presentation layer of the OSI model:

Data encryption, decryption, and formatting

What attack involves sending disassociation frames to wireless devices, thus disconnecting clients from the wireless network?

Deauthentication attack

ARP Poisoning allows an attacker to

Eavesdrop on the traffic sent through the Switch

Which of the following is a key benefit of SaaS?

Elimination of the need for installations and updates on individual computers

A person who enjoys the challenge of breaching networks and bypassing security measures for the thrill, without malicious intent and sometimes pointing out flaws to the affected parties, can be termed a:

Grey Hat Hacker

What is a Type 2 hypervisor?

Hypervisor software that must be installed as an application running on a host OS. A Type 1 (or bare metal) hypervisor is installed directly to the host hardware.

Which wireless infrastructure mode uses a central wireless device, such as a wireless router or wireless access point?

Infrastructure

Upon discovering a malware infection on a computer, what is the FIRST action that should be taken?

Isolate the infected computer from the network

Which cloud service model is best for software development companies that want to develop and test software applications without managing the underlying infrastructure?

PaaS

What does IaaS provide to the consumer?

Physical computing resources, virtualized and delivered over the internet

What type of deployment is most likely to use dedicated hardware for cloud services?

Private Cloud

Sam was just hired to work on the security team that will be attempting to compromise the company's network to discover what vulnerability exist. Which team did he get hired to?

Red

Which risk management strategy is illustrated by continuing to use a network device with a known risk without implementing any mitigating security measures?

Risk Acceptance

.Which risk management approach entails removing the threat or vulnerability altogether to entirely negate the related risk?

Risk Avoidance

Which risk management strategy involves implementing security measures to decrease the probability of a risk happening or to lessen its effects should it occur?

Risk Mitigation

A network firewall analyzes each packet against a set of security criteria before deciding to allow or block. This approach is known as:

Rule-Based Access Control

What type of attack floods a network with ICMP echo request packets, amplifying the attack by using a large number of hosts?

Smurf Attack

In a DAC (Discretionary Access Control) system, who typically has the authority to set or change permissions?

The owner of the resource

Due to its location in a coastal area, a data center's operational continuity is at risk from hurricanes. This natural event is categorized as a:

Threat

What is the primary function of a router in a network?

To connect multiple networks and route data packets between them

How can organizations reduce the risk associated with port scanning attacks?

Using firewalls to block unnecessary ports

What is a Type 1 hypervisor?

Virtualization software that runs directly on the host's hardware to control the hardware and to manage VM guest operating systems

While setting up a Wi-Fi network, the network administrator decides to use a wireless encryption method that includes each device using a unique encryption key.Which protocol is the administrator choosing?

WPA3

If a network admin needs to see if a TCP connection is active on a Windows computer, what command should they use?

netstat


Kaugnay na mga set ng pag-aaral

Union Find - Dynamic Connectivity

View Set

Catcher and the Rye Chapters 15-26

View Set

Racial and Ethnic Relations- Final Exam (Old Stuff)

View Set

General Psychology Module 5 Quiz

View Set