computer security 328

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?

botnet

Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.

False

The Transport layer of the OSI model includes the RIP protocol.

False

Which of the following is an element of the TCP header that can indicate that a connection has been established?

Flags

What is the packet called where a Web browser sends a request to the Web server for Web page data?

HTTP GET

What is contained in ARP tables?

IP address, MAC address

Which of the following is the first packet sent in the TCP three-way handshake?

SYN

Which of the following was developed as a way of enabling Web servers and browsers to exchange encrypted information and uses a hashed message authentication code to increase security?

TLS

Which field in the IP header is an 8-bit value that identifies the maximum amount of time the packet can remain in the network before it is dropped?

TTL

Which of the following is a reason that UDP is faster than TCP?

it doesn't guarantee delivery

service password-encryption

link state

Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?

macro

Which of the following is true about asymmetric cryptography?

the public key is used to encrypt a message sent to the private key owner

Which of the following is true about ACLs on Cisco routers?

there is an implicit deny any statement at the end of the ACL

Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?

IDPS

Which of the following is an accurate set of characteristics you would find in an attack signature?

IP address, TCP flags, port numbers

Which of the following is a valid IPv6 address?

1080::8:800:200C:417A

How large is the IPv6 address space?

128 bits

If you are subnetting a class B network, what subnet mask will yield 64 subnets?

255.255.252.0

Which of the following is considered a flooded broadcast IP address?

255.255.255.255

deny ip 172.31.0.0 0.0.255.255 any log

ARP requests

Which of the following is described as a 64-bit block cipher composed of a 16-round Feistel network and key-dependent S-box functions?

Blowfish

Which protocol that runs on Cisco routers shares information between Cisco devices?

CDP

Which protocol is responsible for automatic assignment of IP addresses?

DHCP

Which of the following makes a single pass on data and generates a 128-bit hash value displayed as a 32-character hexadecimal number and is used in VPNs?

Message Digest 5

Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?

RPC attacks

Which TCP flag can be the default response to a probe on a closed port?

RST

Which of the following is a current standard for PKI that specifies a strict hierarchical system for CAs issuing certificates?

X.509

Which type of scan has the FIN, PSH, and URG flags set?

Xmas scan

Which of the following is the first step in the digital signature process where Mike sends a message to Sophie?

a message digest of Mike's message is calculated using a hashing algorithm

Which of the following is NOT among the items of information that a CVE reference reports?

attack signature

Which security layer verifies the identity of a user, service, or computer?

authentication

What type of attack does a remote-access Trojan attempt to perpetrate?

back door

Which of the following is NOT information that a packet filter uses to determine whether to block a packet?

checksum

To what type of port on a Cisco router do you connect a rollover cable?

console

What is the term used when an IDPS doesn't recognize that an attack is underway?

false negative

Which of the following is a command you would find in an antispoofing ACL for network 172.31.0.0/16?

deny ip 172.31.0.0 0.0.255.255 any log

What uses mathematical calculations to compare routes based on some measurement of distance?

distance-vector routing protocols

With which access control method do system administrators establish what information users can share?

mandatory access control

Of what category of attack is a DoS attack an example?

multiple-packet attack

Which type of function is used in cryptography?

permutation

What is a VPN typically used for?

secure remote access

What Cisco router command encrypts all passwords on the router?

service password-encryption

What remote shell program should you use if security is a consideration?

ssh

How are the two parts of an IP address determined?

subnet mask

Under which attack category does a UNIX Sendmail exploitation fall?

suspicious data payload

Which of the following is true about Message Authentication Code.

the key is sent to the receiver securely

Which type of firewall policy calls for a firewall to deny all traffic by default?

restrictive policy

What is the most likely weak link when using asymmetric encryption for verifying message integrity and nonrepudiation?

the source of the public keys

Which of the following is true about PRNGs?

they are not completely random


Ensembles d'études connexes

Vocabulary Workshop Level E Unit 10 Answers

View Set

CHAPTER 4 Image Acquisition and Evaluation (Review)/K

View Set

The Debt We Owe the Adolescent Brain Study Guide

View Set

Maternity - Intrapartum NCLEX question Exam 2

View Set

QUESTIONS I GOT WRONG ON 12/24 (EASY PRACTICE TES

View Set

MKT Chapter 19 Concepts- Personal Selling and Sales Management

View Set

Chapter 30: Assessment and Management of Patients With Vascular Disorders and Problems of Peripheral Circulation

View Set

Chapter 12: Collaborative Practice and Care Coordination across Settings (Coursepoint)

View Set