Network + Ch 8 RQ

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What feature of windows server allows for agent-less authentication?

AD (Active Directory)

What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?

ARP performs no authentication, and so it is highly vulnerable to attacks.

what kind of vulnerability is exploited by a ping of deaths?

Buffer overflow

What are the two primary features that give proxy servers an advantage over NAT?

Content filtering and improved performance, reverse proxy.

Which type DoS attack orchestrates an attack using uninfected computers?

DDroS ( Distributed reflective DoS)

A neighbor hacks into your secured wireless network on a regular basis, but you did int give him the password. What loophole was most likely left open?

Default password was never made.

What's the difference between an IDS and an IPS?

IDS (intrusion detection system) creates alerts when suspicious activity happens. IPS (intrusion Prevention system) prevents traffic from reaching the network.

What wireless attack might a potential hacker execute with a specially configured transmitter?

Jamming

At what layer of the OSI model do proxy servers operate?

Layer 7, Application Layer

What of the following features does not distinguish an NGFW from traditional firewalls?

NGFW have built-in Application Control features and are application aware, user awareness, context aware. NGFW does not use UTM

What causes most firewall failures?

Not being configured correctly

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

Posture assessment

What kinds of issues might indicate a miss-configured ACL?

Wrong people being able to log in.

What software might be installed on a device in order to authenticate it to the network?

agent

What unique characteristic of zero-day exploits make them so dangerous?

because the vulnerability is exploited before the software developer has the opportunity to provide a solution for it

What kind of virus runs in place of the computer's normal systems files?

boot-sector viruses

What kind of firewall blocks traffic based on application data contained within the packets?

content-filtering firewall

Any traffic that is not explicitly permitted in the ACL is _______, which is called the ______.

dropped, implicit deny

Regarding managing security security levels, why do network administrators create domain groups?

to assign rights that meet the needs of those groups.

What distinguishes a virus from other types of malware?

to be a virus it must replicate itself with the intent to infect more computers.


Ensembles d'études connexes

Organizace trhů a odvětví pohledem manažerů

View Set