Online Connections Quiz 5
What is the term used to describe the area of a network which stores servers that are accessible to any users from the Internet?
DMZ
Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?
SSID
What type of DoS attack originates from a malicious host that has an invalid source IP address and that requests a client connection?
SYN flooding
What characteristic describes a DoS attack?
an attack that slows or crashes a device or network service
What is an example of social engineering?
an unidentified person claiming to be a technician collecting user information from employees
What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?
spyware
Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?
All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
What type of attack is the ping of death?
Denial of Service
Which two actions improve security on a wireless network? (Choose two.)
Enabling WEP and MAC filtering
Which malicious program appears as a legitimate program to deceive the victim, but is in fact an attack tool that can contain malicious code?
Trojan horse
A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?
WPA2 specifies the use of a dynamic encryption key.
What characteristic describes a firewall appliance?
a network device that filters access and traffic coming into a network
What type of authentication do most access points use by default?
open
What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?
phishing
What characteristic describes adware?
software that is installed on a user device and collects information about the user
What characteristic describes identity theft?
the use of stolen credentials to access private data
What is the purpose of a wireless SSID?
to uniquely indentify a wireless network
What characteristic describes a virus?
malicious software or code running on an end device
What is the purpose of a DMZ?
It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
MAC filtering
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
antispyware
What is the primary means for mitigating virus and Trojan horse attacks?
antivirus software
What characteristic describes antivirus software?
applications that protect end devices from becoming infected with malicious software
What characteristic describes phishing?
applications that protect end devices from becoming infected with malicious software
Which type of attack attempts to overwhelm network links and devices with useless data?
denial of service
How does a phisher typically contact a victim?
Which component is designed to protect against unauthorized communications to and from a computer?
firewall
What characteristic describes a Trojan horse?
malicious software or code running on an end device
What characteristic describes antispam?
software that identifies email spam and automatically deletes or places them in a junk folder
What characteristic describes spyware?
software that is installed on a user device and collects information about the user