Cybersecurity
match the attack cache poisining amplication and reflection resource utilazation attack sending falsified infromation send multiple packets to consume resourses increases volume of attacks and masks it
1-cache poisining 3-amplication and reflection 2-resource utilazation attack 1-sending falsified infromation 2-send multiple packets to consume resourses 3-increases volume of attacks and masks it
A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term? The potential damage to the organization that is caused by the threat. The actions that are taken to protect assets by mitigating a threat or reducing risk. The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence. A weakness in a system or its design that could be exploited by a threat.
A weakness in a system or its design that could be exploited by a threat.
What is a vulnerability that allows criminals to inject scripts into web pages viewed by users? Cross-site scripting XML injection SQL injection buffer overflow
Cross-site scripting
What three best practices can help defend against social engineering attacks? (Choose three.) Deploy well-designed firewall appliances. Educate employees regarding policies. Add more security guards. Do not provide password resets in a chat window. Enable a policy that states that the IT department should supply information over the phone only to managers. Resist the urge to click on enticing web links.
Educate employees regarding policies. Do not provide password resets in a chat window Resist the urge to click on enticing web links
Which security measure is best used to limit the success of a reconnaissance attack from within a campus area network? Implement access lists on the border router. Implement encryption for sensitive traffic. Implement a firewall at the edge of the network. Implement restrictions on the use of ICMP echo-reply messages.
Implement encryption for sensitive traffic.
The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email? It is a hoax. It is an impersonation attack. It is a piggy-back attack. It is a DDoS attack.
It is a hoax.
What is an IPS signature? It is the timestamp that is applied to logged security events and alarms. It is the authorization that is required to implement a security policy. It is a set of rules used to detect typical intrusive activity. It is a security script that is used to detect unknown threats.
It is a set of rules used to detect typical intrusive activity.
What type of attack targets an SQL database using the input field of a user? XML injection Cross-site scripting SQL injection buffer overflow
SQL injection
Which type of network attack involves randomly opening many Telnet requests to a router and results in a valid network administrator not being able to access the device? spoofing man-in-the-middle SYN flooding DNS poisoning
SYN Flooding
What is a characteristic of the WLAN passive discover mode? The AP periodically sends beacon frames containing the SSID. The beaconing feature on the AP is disabled. The client begins the discover process by sending a probe request. The client must know the name of the SSID to begin the discover process.
The AP periodically sends beacon frames containing the SSID.
Which statement describes a VPN? VPNs use dedicated physical connections to transfer data between remote users. VPNs use logical connections to create public networks through the Internet. VPNs use open source virtualization software to create the tunnel through the Internet. VPNs use virtual connections to create a private network through a public network.
VPNs use virtual connections to create a private network through a public network.
Which combination of WLAN authentication and encryption is recommended as a best practice for home users? WEP and TKIP WPA2 and AES EAP and AES WPA and PSK WEP and RC4
WPA2 and AES
What are two drawbacks to using HIPS? (Choose two.) HIPS has difficulty constructing an accurate network picture or coordinating events that occur across the entire network. HIPS installations are vulnerable to fragmentation attacks or variable TTL attacks. With HIPS, the network administrator must verify support for all the different operating systems used in the network. If the network traffic stream is encrypted, HIPS is unable to access unencrypted forms of the traffic. With HIPS, the success or failure of an attack cannot be readily determined.
With HIPS, the network administrator must verify support for all the different operating systems used in the network. With HIPS, the success or failure of an attack cannot be readily determined.
A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN? a user passphrase a key that matches the key on the AP a username and password configured on the AP the company username and password through Active Directory service
a key that matches the key on the AP
What does the term vulnerability mean? a weakness that makes a target susceptible to an attack a computer that contains sensitive information a method of attack to exploit a target a known target or victim machine a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.) fragment offset flag identification version protocol TTL
fragment offset flag identification
Which term describes a field in the IPv4 packet header used to detect corruption in the IPv4 header? header checksum version destination IPv4 address protocol
header checksum
A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords? an internal threat unencrypted devices improper access control hard copy
improper access control
What is the first line of defense to protect a device from improper access control? encryption end user license agreement (EULA) passwords shredding
passwords
What is a function of SNMP? provides statistical analysis on packets flowing through a Cisco router or multilayer switch provides a message format for communication between network device managers and agents captures packets entering and exiting the network interface card synchronizes the time across all devices on the network
provides a message format for communication between network device managers and agents
A disgruntled employee is using Wireshark to discover administrative Telnet usernames and passwords. What type of network attack does this describe? denial of service port redirection reconnaissance trust exploitation
reconnaissance
Which risk management plan involves discontinuing an activity that creates a risk? risk reduction risk retention risk avoidance risk sharing
risk avoidance
A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation? rogue access point password policy user error user laptop weak password
rogue access point
Match the type of cyberattackers to the description. state sposored attackers hacktivists vunribility brokers gather intelegence or comit sabatoge on behalf of there goverment discover vunribilitys and tell vendors make politicl statments
state sposored attackers hacktivists vunribility brokers gather intelegence or comit sabatoge on behalf of there goverment discover vunribilitys and tell vendors make politicl statements in order of matching