MIS 1
DNS
This protocol is responsible for matching a domain name (i.e., baylor.edu) with an IP address.
true
A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.
Transport, Segmenting the Data
From a security perspective, if you walk the same route to and from a location every single day you become predictable and stalker can follow you. We defend this predictability in which layer of the OSI and how is this accomplished?
Payment Card Industry Data Security Standard (PCI DSS)
Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?
False
In the IP header, the destination port identifies which service will be needed.
True
In the Zero Trust Extended Framework, the premise of the model is that minimum levels of trust are extended to people, workloads, devices, and networks.
true
Interoperability is the idea that a mobile node can work with foreign agents seamlessly for the user.
false
IoT was advanced by extreme decentralization, mobile network connectivity, and then again extreme decentralization (i.e., moving to the cloud).
False
Malicious code, in singularity, cannot attack all three tenets of the CIA triad.
22
Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?
true
Moore's Law indicates that computing power will continually get faster and cheaper.
Confidentiality
Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.
False
Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.
WAN
What type of network connects systems over the largest geographic area?
Threats
Which of the following do cybersecurity departments have the least control over?
interception and modification
You are an intrusion detection specialist and you notice that data going in and out on port 25 is being truncated. You suspect that the attacker is conducting a multi-categorical attack involving:
Data Link, 9C-S1-3X-B4-A7-6F, unique
A MAC Address is a unique address that operates on _______________ layer, this could be an example of one ______________, and it is _____________.
false
A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.
filtered, DNS
A logical configuration for port 53 would be to set the status at _____________ since ____________ can be manipulated leading to misdirection of users in the network to potentially malicious websites if configured illogically.
true
TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model.
true
The System/Application Domain holds all the mission-critical systems, applications, and data.
true
The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.
false
The main difference between a virus and a worm is that a virus does not need a host program to infect.
true
The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.
True
The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.
Ransomware
This type of attack uses encryption as an attack method rather than a countermeasure.
whaling
This type of socially engineered attack spills over into the personal and business domains and requires the attacker to invest a significant amount of time and money to receive on one time large lump sum payment from a high-level executive or someone that controls significant resources.