CSIS 430 Exam 3-5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

identify any IP address

A technician is tasked with using ACLs to secure a router. When would the technician use the any configuration option or command?

Social Engineering

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes. Which security threat does this phone call represent?

Private Key

If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it?

DoS

In what type of attack is a cybercriminal attempting to prevent legitimate users from accessing network services?

They are infected machines that carry out a DDoS attack.

In what way are zombies used in security attacks?

SYN flood attack

In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections?

DNS cache poisoning

In which type of attack is falsified information used to redirect users to malicious Internet sites?

Trojan Horse

It appears as useful software but hides malicious code.

IPS

It can stop malicious packets.

DDoS

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

Financial gain

What commonly motivates cybercriminals to attack networks as compared to hacktivists or state-sponsored hackers?

financial gain

What commonly motivates cybercriminals to attack networks as compared to hactivists or state-sponsored hackers?

Place identical restrictions on all vty lines.

What is considered a best practice when configuring ACLs on vty lines?

No keyword, ACE from named ACL

What is the quickest way to remove a single ACE from a named ACL?

Origin Authentication

What is the term used to describe a guarantee that the message is not a forgery and does actually come from whom it states?

Exploit

What is the term used to describe a mechanism that takes advantage of a vulnerability?

threat

What is the term used to describe a potential danger to a company's assets, data, or network functionality?

Hactivists

What is the term used to describe gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks?

symmetric encryption algorithm

What is the term used to describe the same pre-shared key or secret key, known by both the sender and receiver to encrypt and decrypt data?

black hat hacker

What is the term used to describe unethical criminals who compromise computer and network security for personal gain, or for malicious reasons?

extended

What type of ACL offers greater flexibility and control over network access?

Worm

What type of malware has the primary objective of spreading across the network?

man-in-the-middle attack

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

confidentiality

Which objective of secure communications is achieved by encrypting data?

DHCP

Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack?

integrity

Which requirement of secure communications is ensured by the implementation of MD5 or SHA hash generating algorithms?​

Filter traffic based on source IP addresses

Which statement describes a characteristic of standard IPv4 ACLs?

Host, any

Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

Destination UDP Port Number, ICMP message type

Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.)

Hactivist

Which type of hacker is motivated to protest against political and social issues?

Ping Sweep

a network scanning technique that indicates the live hosts in a range of IP addresses.

Buffer Overflow

attempting to write more data to a memory location than that location can hold


Ensembles d'études connexes

Chapter 33 Assessment of the Cardiovascular System practice questions

View Set

Chapter 2 - Prenatal Development, Pregnancy and Birth

View Set

Practice test MGT 325 ch 1-6,8,9

View Set

PN Adult Medical Surgical Online Practice 2023 A

View Set