Netsec ex 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

60) To get to the super user account in UNIX, the administrator should use the ________ command. A) RunAs B) su C) rlogin D) None of the above

B Diff: 1 Question: 10g

1) Any device with an IP address is a ________. A) server B) host C) client D) None of the above

B Diff: 1 Question: 1a

38) Which of the following is the most dangerous because it can do more on a computer when it is executed? A) Active-X B) Java C) Javascript D) VBscript

A Diff: 2 Question: 11f

10) ________ are sets of specific actions to be taken to harden all hosts of a particular type and of particular versions within each type. A) Processes B) Security baselines C) Procedures D) None of the above

B Diff: 2 Question: 1h

3) When you use your mobile firm to surf the Internet, it is a host.

TRUE Diff: 1 Question: 1a

13) Systems administrators generally do not manage the network.

TRUE Diff: 1 Question: 1k

100) Windows GPOs can restrict PCs from changing standard configurations.

TRUE Diff: 1 Question: 20f

93) Skype's file transfer generally does not work with antivirus programs.

TRUE Diff: 1 Question: 22f

21) Different UNIX versions have different security methods.

TRUE Diff: 1 Question: 3a

41) It generally is a good idea from a security point of view to upgrade to a new version of an operating system.

TRUE Diff: 1 Question: 5d

43) LINUX commonly uses the rpm method to download patches.

TRUE Diff: 1 Question: 6b

45) Many firms prioritize patches because the cost of installing all patches it too high.

TRUE Diff: 1 Question: 7b

47) Vulnerability patches can result in a loss of functionality in the patched host.

TRUE Diff: 1 Question: 7d

26) The cost of ________ LINUX is definitely far less than the cost of commercial operating systems such as Windows. A) purchasing B) using C) Both A and B D) Neither A nor B

A Diff: 2 Question: 3e

17) The user reaches a webpage before logging in. This is a(n) ________ attack. A) login screen bypass B) buffer overflow C) XSS D) SQL injection attack

A Diff: 2 Question: 5a

49) Assigning security measures to groups is ________ than assigning security measures to individuals within groups. A) cheaper B) less accurate C) Both A and B D) Neither A nor B

A Diff: 2 Question: 8

27) In a URL, ".." (without the quotes) means ________. A) move one directory up B) move one directory down C) move to the operating system's root directory D) ignore the last entry

A Diff: 2 Question: 8f

56) SSL/TLS provides security ________. A) between the sender and his or her e-mail server B) all the way between the sender and the receiver C) Both A and B D) Neither A nor B

A Diff: 3

48) Under what Internet Options tabs are cookies controlled? A) Privacy B) Security C) Protection D) Advanced

A Diff: 3 Question: 13d

60) Which comes third in a VoIP packet? A) RTP header B) UDP header C) IP header D) codec byte stream

A Diff: 3 Question: 18c

64) Which of the following is not a signaling protocol? A) RTP B) SIP C) H.323 D) All of the above ARE signaling protocols.

A Diff: 3 Question: 19c

51) The Local Users and Groups snap-in is available on the ________ MMC. A) Computer Management B) Security C) Permissions D) Local Permissions

A Diff: 3 Question: 9b

43) Cookies are dangerous because they ________. A) allow a website to track what pages you have visited B) may contain sensitive private information about you C) Both A and B D) Neither A nor B

C Diff: 2 Question: 12f

91) Which of the following is a danger created by notebook computer loss or theft? A) Loss of capital investment B) Loss of sensitive data C) Both A and B D) Neither A nor B

C Diff: 2 Question: 19a

94) Computer recover software reports its ________ to a recovery company that works with local police to recover the notebook. A) physical location B) logical location C) IP address D) None of the above.

C Diff: 2 Question: 19f

71) A PSTN gateway translates between a VoIP network's ________ protocols and those of the public switched telephone network. A) signaling B) transport C) Both A and B D) Neither A nor B

C Diff: 2 Question: 19h

7) Which of the following are elements of host hardening? A) Encrypting data on the host B) Read operating system log files C) Both A and B D) Neither A nor B

C Diff: 2 Question: 1f

96) Standard configurations ________. A) afford strong control over the system security configuration B) reduce maintenance costs C) Both A and B D) Neither A nor B

C Diff: 2 Question: 20b

74) Spam over VoIP is called ________. A) VAM B) SOVI C) SPIT D) SPIP

C Diff: 2 Question: 20f

79) Eavesdropping can be thwarted by encrypting ________. A) signaling traffic B) transport traffic C) Both A and B D) Neither A nor B

C Diff: 2 Question: 21c

80) In VoIP, encryption may ________. A) reduce throughput B) increase jitter C) increase latency D) make traffic unreadable

C Diff: 2 Question: 21d

82) In VoIP, firewalls are a problem because they tend to ________. A) reduce throughput B) increase jitter C) increase latency D) make traffic unreadable

C Diff: 2 Question: 21e

39) A patch is a labor-intensive process of manual steps that a firm must do to address a vulnerability.

FALSE Diff: 1 Question: 5b

50) Assigning security measures to individuals within groups is cheaper than assigning security measures to groups.

FALSE Diff: 1 Question: 8

10) Generally speaking, vendors use similar mechanisms for downloading and installing patches.

FALSE Diff: 2

44) Scripts do not have the ability to permanently change your computer registry.

FALSE Diff: 2

6) When executing attack code, if the attacker has skillfully overwritten the return address, the return address will not point back to "data" in the buffer.

FALSE Diff: 2

65) Signaling is the carriage of voice between two parties.

FALSE Diff: 2

66) Transport consists of communication to manage the network.

FALSE Diff: 2

70) Like the public switched telephone network, VoIP technology is a closed system.

FALSE Diff: 2

88) If NAT changes the Layer 3 IP destination addresses, the protocol will still work properly.

FALSE Diff: 2

86) A company should decide upon a single security baseline for use with its client PCs.

FALSE Diff: 2 Question: 14

55) Encryption is heavily used in commercial e-mail.

FALSE Diff: 2 Question: 17a

95) Computer recover software reports its physical location to a recovery company that works with the local police to recover the notebook.

FALSE Diff: 2 Question: 19f

89) Skype's security protocols have been publicly studied and approved.

FALSE Diff: 2 Question: 22b

8) Experts advise firms to turn on most or all applications and then harden them.

FALSE Diff: 2 Question: 4d

16) Programmers can trust user input if the person is strongly authenticated.

FALSE Diff: 2 Question: 5d

84) A shoulder surfing attack will not be successful unless the attacker can read the entire password.

FALSE Diff: 2 Question: 8c

47) In Internet Explorer, the Security tab controls the website's pop-up blocker.

FALSE Diff: 3

59) PKI uses circles of trust.

FALSE Diff: 3

81) The password SeAtTle can be broken by a dictionary attack.

FALSE Diff: 3 Question: 7e

75) According to the book, r%Dv$ is a strong password.

FALSE Diff: 3 Question: 9a

99) After access is granted to a network, many NACs continue to monitor network PCs.

TRUE Diff: 2 Question: 20e

84) Firewall port openings are required for SIP/H.323 messages.

TRUE Diff: 2 Question: 21g

85) NAT adds latency to VoIP packets.

TRUE Diff: 2 Question: 21h

90) Skype can decrypt and read user traffic.

TRUE Diff: 2 Question: 22c

27) A specific distribution of UNIX comes with multiple user interfaces.

TRUE Diff: 2 Question: 3f

35) Attackers frequently create exploits within hours or days after a fix is released by a vendor.

TRUE Diff: 2 Question: 4d

40) A Microsoft Windows Service Pack is a group of vulnerability fixes and sometimes functionality improvements.

TRUE Diff: 2 Question: 5c

77) Stealing the password file from a computer is safer than attempting to log in remotely.

TRUE Diff: 2 Question: 6d

82) There is a legitimate reason for systems administrators to crack user passwords.

TRUE Diff: 2 Question: 9b

46) With Active-X controls, active scripting is enabled by default.

TRUE Diff: 3

81) H.323 uses Ports 1719 and 1720

TRUE Diff: 3

65) In Windows, a user's effective permissions are all those inherited from its parent directory plus any specifically allowed permission, minus those denied.

TRUE Diff: 3 Question: 11f

76) SIP identity protocols are common on IP telephones.

TRUE Diff: 3 Question: 21a

91) Which of the following statements accurately describes Skype? A) Skype controls who can register a particular person's name. B) Skype cannot decrypt or read user traffic. C) Skype's proprietary software and protocols have not been publicly studied and approved. D) None of the above

C Diff: 2 Question: 22d

94) In IM, ________ servers allow two users to locate each other. A) index B) relay C) presence D) All of the above

C Diff: 2 Question: 24a

100) Which version of SNMP allows the manager to have a different shared secret with each agent? A) Version 1 B) Version 2 C) Version 3 D) All of the above

C Diff: 2 Question: 26c

4) An attacker types more data in a field than the programmer expected. This is a(n) ________ attack. A) denial-of-service B) directory traversal C) buffer overflow D) XSS

C Diff: 2 Question: 2b

9) To prevent eavesdropping, applications should ________. A) be updating regularly B) use electronic signatures C) use encryption for confidentiality D) use encryption for authentication

C Diff: 2 Question: 4f

37) A ________ is a type of fix for vulnerabilities. A) work-around B) service pack C) Both A and B D) Neither A nor B

C Diff: 2 Question: 5a

18) In a(n) ________ attack, information that a user enters is sent back to the user in a webpage. A) login screen bypass B) buffer overflow C) XSS D) SQL injection attack

C Diff: 2 Question: 5b

48) Assigning security measures to groups is better than assigning security measures to individuals within groups because ________. A) applying security measures to groups takes less time than applying them individually B) applying security measures in groups reduces errors in assigning security settings C) Both A and B D) Neither A nor B

C Diff: 2 Question: 8

9) A company should not replace default passwords during configuration.

FALSE Diff: 1 Question: 1g

12) Systems administrators manage individual hosts but not groups of hosts.

FALSE Diff: 1 Question: 1j

25) A LINUX distribution consists only of the LINUX kernel.

FALSE Diff: 1 Question: 3d

29) CLI shells use more system resources than GUIs.

FALSE Diff: 1 Question: 3h

30) CLIs usually are easier to learn than GUIs.

FALSE Diff: 1 Question: 3i

33) An attack that comes before fixes are released is called a vulnerability attack.

FALSE Diff: 1 Question: 4c

56) The act of taking over a super user account is called hacking root.

TRUE Diff: 1 Question: 10d

21) Custom programs generally are safe because attackers do not know the code.

FALSE Diff: 1 Question: 7d

28) E-commerce software is not complex and has few subsystems.

FALSE Diff: 2

20) In a(n) ________ attack, the user enters part of a database query instead of giving the expected input. A) login screen bypass B) buffer overflow C) XSS D) SQL injection attack

D Diff: 2 Question: 5c

42) On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high.

TRUE Diff: 1 Question: 12e

42) Since Windows Server 2003, servers can be programmed to check for updates automatically.

TRUE Diff: 1

51) Companies are responsible for filtering sexually or racially harassing messages and can be sued for not doing so.

TRUE Diff: 1

54) Spammers are one reason that some companies have outsourced e-mail filtering.

TRUE Diff: 1

3) Operating system hardening is more total work than application hardening.

FALSE Diff: 1

34) Java applets are large Java programs.

FALSE Diff: 1

52) Spammers use sticky spam, which presents their message as a graphical image.

FALSE Diff: 1

67) Signaling does not consist of communication to manage the network.

FALSE Diff: 1

75) SPIT is where the attacker uses the corporate VoIP network to place free calls.

FALSE Diff: 1

77) VoIP security can easily be implemented even if the company's basic security is weak.

FALSE Diff: 1

92) The Skype protocol is relatively easy for corporate firewalls to filter.

FALSE Diff: 1

55) The super user account in Windows is called root.

FALSE Diff: 1 Question: 10c

59) To get to the super user account in UNIX, the administrator can use the RunAs command.

FALSE Diff: 1 Question: 10f

40) JavaScript is a scripted form of Java.

FALSE Diff: 1 Question: 11h

68) In UNIX, the Execute permission gives the permission to make changes.

FALSE Diff: 1 Question: 12b

70) Windows offers only 3 directory permissions.

FALSE Diff: 1 Question: 12c

71) UNIX offers more directory and file permissions than Windows.

FALSE Diff: 1 Question: 12c

64) Inheritance can be modified from the ________ box in the security tab. A) allow permissions B) deny permissions C) Both A and B D) Neither A nor B

C Diff: 2 Question: 11e

18) In MMCs, the tree pane lists ________. A) objects on which actions can be taken B) actions that can be taken on the selected object C) Both A and B D) Neither A nor B

A Diff: 2 Question: 2f

86) VoIP traffic and data traffic tend to be segregated from each other on a network for added security. A) True. B) False. This would increase costs too much. C) False. This would negate the benefits of convergence.

A Diff: 2 Question: 21i

95) In IM, all messages pass through a ________ server. A) relay B) presence C) Both A and B D) Neither A nor B

A Diff: 2 Question: 24b

16) The Microsoft Windows Server interface looks like the interface in ________. A) client versions of Microsoft Windows B) UNIX C) Both A and B D) Neither A nor B

A Diff: 2 Question: 2c

5) In a stack overflow attack, to where does the return address point? A) To the beginning of the stack entry's data area B) To the end of the stack entry's data area C) To the next command in the program being hacked D) To the return address entry in the stack entry

A Diff: 2 Question: 2e

23) ________ is a version of ________ for PCs. A) LINUX, UNIX B) UNIX, LINUX C) Both A and B D) Neither A nor B

A Diff: 1

39) Compared to full programming languages, scripts are ________ in what they can do. A) more limited B) less limited C) about as limited (but easier to use) D) not limited at all

A Diff: 1

69) UNIX offers ________ directory and file permissions than (as) Windows. A) fewer B) more C) about the same number of D) None of the above

A Diff: 1

52) The super user account has ________ control over the computer. A) total or nearly total B) substantial but not nearly total C) little D) no

A Diff: 1 Question: 10a

30) Developers have permissions on the ________. A) development server B) testing server C) production server D) Both A and B

A Diff: 1 Question: 10b

54) The super user account in UNIX is called ________. A) root B) administrator C) MMC D) kernel

A Diff: 1 Question: 10c

92) Mobile computers should be backed up ________. A) before being taken off site B) as soon as brought back on-site C) Neither A nor B. Mobile computers do not need to be backed up. D) Both A and B

A Diff: 1 Question: 19b

4) ________ is necessary to protect the host against attacks. A) Host hardening B) Host bulwarking C) Host shielding D) None of the above

A Diff: 1 Question: 1b

87) ________ is a VoIP service that currently offers free calling among its customers over the Internet and reduced-cost calling to and from Public Switched Telephone Network customers. A) Skype B) SIP C) SPIT D) IM

A Diff: 1 Question: 22a

19) A ________ is an individual application on the tree pane of an MMC that can be added or dropped from the tree list easily. A) snap-in B) management application C) administrative application D) Action

A Diff: 1 Question: 2g

22) ________ is a family of operating systems that share interoperability at the kernel level. A) UNIX B) LINUX C) Both A and B D) Neither A nor B

A Diff: 1 Question: 3b

28) UNIX command line interfaces are called ________. A) shells B) GUIs C) Both A and B D) Neither A nor B

A Diff: 1 Question: 3g

44) Software vendors typically release ________ patches per product in a typical year. A) many B) a few C) no

A Diff: 1 Question: 7a

74) Long passwords that use several types of keyboard characters are called ________ passwords. A) complex B) reusable C) dictionary D) one-time

A Diff: 1 Question: 7a

79) ________ is a password-cracking method wherein the attacker compares passwords to lists of common words. A) A dictionary attack B) A hybrid dictionary attack C) A combinatorial attack D) Brute-force guessing

A Diff: 1 Question: 7e

7) Overall for firms, which is more time consuming to patch? A) Applications B) Operating systems C) Both are about equally time consuming to patch D) None of the above

A Diff: 2

32) A(n) ________ is a program that takes advantage of a(n) ________. A) exploit, vulnerability B) vulnerability, exploit C) Both A and B D) Neither A nor B

A Diff: 2

97) ________ offers no security at all. A) SNMP V1 B) SNMP V2 C) SNMP V3 D) All of the above offer security.

A Diff: 2

57) A Windows systems administrator should use the Administrator account ________. A) as little as possible, and only when needed B) as his or her main account, for auditability C) his or her main account, for the permissions it provides D) None of the above. The Windows systems administrator should never user the Administrator account.

A Diff: 2 Question: 10e

58) To get to the super user account in Windows, the administrator can use the ________ command. A) RunAs B) su C) rlogin D) None of the above

A Diff: 2 Question: 10f

73) ________ allows many different groups to be assigned different permissions. A) Windows B) UNIX C) Both A and B D) Neither A nor B

A Diff: 2 Question: 12e

58) Which of the following uses a PKI? A) S/MIME B) PGP C) Both A and B D) Neither A nor B

A Diff: 2 Question: 17e

8) Which of the following are elements of host hardening? A) Minimizing applications on the host B) Having a good border firewall C) Both A and B D) Neither A nor B

A Diff: 2 Question: 1f

98) If a PC fails its initial NAC health assessment, it may be ________. A) refused access B) allowed to go to a remediation server and other nonsensitive resources C) Either A or B D) Neither A nor B

A Diff: 2 Question: 20d

73) Someone breaks into a corporate VoIP system to place free long-distance and international toll calls. This is referred to by security professionals as ________. A) toll fraud B) VoIP hacking C) phone phreaking D) blue boxing

A Diff: 2 Question: 20e

78) SIP Identity protocols ________. A) ensure that traffic is authenticated between two companies holding public/private keys B) are uncommon on IP telephones C) Both A and B D) Neither A nor B

A Diff: 2 Question: 21b

31) ________ errors may indicate that an attacker is trying to send invalid data to the server. A) 404 B) 303 C) 500 D) 512

C Diff: 2

33) Code on a webpage that is executed on the client PC is ________. A) a Trojan horse B) a Virus C) mobile code D) an XSS attack

C Diff: 2 Question: 11c

63) Inheritance ________ labor costs in assigning permissions. A) increases B) reduces C) inheritance does not significantly change the labor costs in assigning permissions D) None of the above

B Diff: 1

53) The super user account in Windows is called the ________. A) root B) Administrator C) MMC D) Super

B Diff: 1 Question: 10b

32) Testers have permissions on the ________. A) development server B) testing server C) production server D) Both A and B

B Diff: 1 Question: 10e

67) In UNIX, the ________ permission allows the user to make changes. A) execute B) write C) read D) modify

B Diff: 1 Question: 12b

2) The most popular way for hackers to take over hosts today is ________. A) by taking over the operating system B) by taking over an application C) by guessing the root password D) by taking over the user interface

B Diff: 1 Question: 1b

14) Microsoft's server operating system is called ________. A) UNIX B) Windows Server C) Both A and B D) Neither A nor B

B Diff: 1 Question: 2a

17) MMCs are administrative used to manage ________ servers. A) Apple B) Microsoft C) UNIX D) All of the above

B Diff: 1 Question: 2d

34) A(n) ________ is defined as an attack that comes before fixes are released. A) exploit B) zero-day attack C) worm D) anomaly attack

B Diff: 1 Question: 4c

38) What is the name for a small program that fixes a particular vulnerability? A) Work-around B) Patch C) Service pack D) Version upgrade

B Diff: 1 Question: 5b

76) The book recommends that passwords be at least ________ characters long. A) 6 B) 8 C) 20 D) 100

B Diff: 1 Question: 9a

63) RTP stands for ________. A) Real Transfer Protocol B) Real Time Protocol C) Real Transport Protocol D) None of the above

B Diff: 2

98) ________ introduced community strings for security, in which a shared secret was used to authenticate messages. A) SNMP V1 B) SNMP V2 C) SNMP V3 D) None of the above

B Diff: 2

61) Which of the following is not a standard Windows privilege? A) Modify B) All C) Read & execute D) List folder contents

B Diff: 2 Question: 11b

88) Updating should be done on client PCs ________. A) manually B) automatically C) only after careful testing of the update D) Client PCs should not be updated.

B Diff: 2 Question: 16

61) RTP adds ________ to UDP. A) security B) sequence numbers C) Both A and B D) Neither A nor B

B Diff: 2 Question: 18d

62) RTP is used in ________. A) signaling B) transport C) Both A and B D) Neither A nor B

B Diff: 2 Question: 19b

69) SIP proxy servers are used in ________. A) transport transmissions B) signaling transmissions C) Both A and B D) Neither A nor B

B Diff: 2 Question: 19g

96) To satisfy legal retention and other compliance regulations, companies should use ________ in IM. A) a presence server B) a relay server C) Either A or B D) Neither A nor B

B Diff: 2 Question: 24c

45) Under what Internet Options tabs are general security settings for websites controlled? A) Privacy B) Security C) Protection D) Advanced

B Diff: 3 Question: 13b

57) What e-mail standard provides end-to-end security? A) SSL/TLS B) S/MIME C) Both A and B D) Neither A nor B

B Diff: 3 Question: 17d

6) If an attacker takes over a router, he or she will be able to ________. A) map the entire internal network B) reroute traffic to cause a local DoS C) Both A and B D) Neither A nor B

B Diff: 3 Question: 1e

20) Which of the following statements is not an accurate description of MMCs? A) MMCs are produced by Microsoft. B) MMCs are located under the Start / Management menu choice. C) MMCs use GUIs. D) MMCs are relatively easy to learn to use.

B Diff: 3 Question: 2j

15) For all applications, a basic rule is ________. A) always trust user input B) sometimes trust user input C) never trust user input D) None of the above

C Diff: 1

66) Which is not one of the three UNIX permissions? A) Read B) Write C) List folder contents D) Execute

C Diff: 1 Question: 12a

11) A systems administrator may manage ________. A) an individual host B) a group of hosts C) Both A and B D) Neither A nor B

C Diff: 1 Question: 1j

15) Which of the following security protections are provided by recent version of Windows Server? A) Server software firewalls B) The ability to encrypt data C) Both A and B D) Neither A nor B

C Diff: 1 Question: 2b

31) A(n) ________ is a security weakness that makes a program vulnerable to attack. A) attack vector B) exploit C) vulnerability D) All of the above

C Diff: 1 Question: 4a

46) ________ can greatly reduce patching costs. A) Vulnerability management servers B) Manual downloads C) Patch management servers D) All of the above

C Diff: 1 Question: 7c

29) Whisker is a popular tool for ________. A) reading website error logs B) providing a webserver proxy in front of the webserver C) conducting vulnerability testing on webservers D) All of the above

C Diff: 1 Question: 9b

50) E-mail filtering can be done at which of the following? A) The user's PC B) The corporate e-mail servers C) E-mail managed service providers D) All of the above

D Diff: 1

62) To how many accounts and groups can different permissions be applied in Windows? A) 3 B) 6 C) 100 D) almost an unlimited number

D Diff: 1 Question: 11c

72) UNIX allows permissions to be assigned to ________. A) the account that owns the file or directory B) a group associated with the directory C) everyone else D) All of the above

D Diff: 1 Question: 12d

53) The prevention of sensitive information from being sent out of a company is called ________. A) unified threat management B) antivirus filtering C) attachment deletion D) extrusion prevention

D Diff: 1 Question: 14f

93) The policies for protecting sensitive information should be applied to all mobile data on ________. A) mobile hard drives B) USB RAM drives C) MP3 players D) All of the above

D Diff: 1 Question: 19d

24) The core part of the LINUX operating system is called ________. A) the foundation B) UNIX C) GNU D) the kernel

D Diff: 1 Question: 3c

80) ________ is a password-cracking method wherein the attacker tries all possible passwords, starting with single-character passwords. A) A dictionary attack B) A hybrid dictionary attack C) A combinatorial attack D) Brute-force guessing

D Diff: 1 Question: 7a

24) Which of the following are reasons to ensure WWW Service and E-Commerce security? A) Cost of disruptions B) Customer fraud C) Exposure of sensitive private information D) All of the above

D Diff: 2

89) Which of the following is not a common problem with antivirus protections? A) Users may turn the AV off. B) The virus program contract may expire. C) Automatic updates of virus signatures might be inadvertently turned off. D) All of the above are common problems with antivirus protections.

D Diff: 2 Question: 17

36) Which of the following is not a type of fix for vulnerabilities? A) Work-arounds B) Patches C) Version upgrades D) All of the above are types of fixes for vulnerabilities

D Diff: 2 Question: 5a

22) Attacks in which a user reaches a directory outside of the WWW root directory and its subdirectories is called a(n) ________ attack. A) cross-site scripting B) SQL injection C) mobile code D) directory traversal

D Diff: 2 Question: 8d

68) A VoIP caller wishing to contact another sends an INVITE message to ________. A) the caller's H.323 proxy server B) the receiver's H.323 proxy server C) the receiver directly D) None of the above

D Diff: 3 Question: 19e

5) If an attacker takes over a firewall, he or she will be able to ________. A) allow connection-opening requests that violate policy B) reroute internal data to alternate paths C) provide the false sense that the firewall is still working correctly D) All of the above

D Diff: 3 Question: 1d

83) SIP requires port ________ to be open. A) 47 B) 505 C) 3434 D) 5060

D Diff: 3 Question: 21f

13) When securing application configuration settings, default password settings should not be changed.

FALSE Diff: 1

25) Most firms do a satisfactory job overseeing the deployment of custom programs used to supplement packaged software.

FALSE Diff: 1

26) Website defacement occurs when attackers take over a computer and produce false web pages.

FALSE Diff: 1

99) DNS, DHCP, and LDAP are examples of supervisory protocols in TCP/IP.

TRUE Diff: 2

90) Antivirus protections may be deliberately turned off by users.

TRUE Diff: 2 Question: 17

72) DoS attacks against VoIP can be successful even if they increase latency only slightly.

TRUE Diff: 2 Question: 20b

97) When a computer attempts to connect to a network, NAC queries the PC for information present in the Windows Security Center to determine if all updates are current and AV is working.

TRUE Diff: 2 Question: 20c

11) The first task in security is to understand the environment to be protected.

TRUE Diff: 1

12) Baselines are used to go beyond default installation configurations for high-value targets.

TRUE Diff: 1

14) Operating system account passwords provide limited protection.

TRUE Diff: 1

35) Users usually must click on malicious links in order to execute them.

TRUE Diff: 1

36) Cookies can used to track users at a website.

TRUE Diff: 1

83) Rainbow tables contain lists of pre-computed password hashes that are indexed to expedite the password cracking process.

TRUE Diff: 1

49) A down side of spam filtering is the deletion of some legitimate messages.

TRUE Diff: 1 Question: 14d

87) You can quickly assess the general security posture of your Windows Vista PC by using the status check in the Windows Security Center.

TRUE Diff: 1 Question: 15

1) If a hacker takes over an application program, he or she receives the permissions with which the program runs.

TRUE Diff: 1 Question: 1a

2) Any device with an IP address is a host.

TRUE Diff: 1 Question: 1a

85) It is very important for testers to get permission before running a password cracking program on their company's computers to check for weak passwords even if such testing is in their job definitions.

TRUE Diff: 1 Question: 9c

19) In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.

TRUE Diff: 2

23) Blind SQL injection uses a series of SQL statements that produce different responses based on true/false questions, or timed responses.

TRUE Diff: 2

37) Accepting cookies is necessary to use many websites.

TRUE Diff: 2

41) To take advantage of user typing errors, attackers register site names that are similar to those of legitimate domain names.

TRUE Diff: 2

78) Password hashes are created when a password is passed from a user to a hashing function.

TRUE Diff: 2


Ensembles d'études connexes

Life and Death Decisions Midterm 2

View Set