Network CH 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

distributed reflection denial-of-service attack

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

Phishing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

NDA

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

True

A drop ceiling could be used by an intruder to gain access to a secured room.

Insider threat

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Require minimum number of characters & Require at least one of different kinds of characters (numbers, capital letters)

A password policy as part of a network user agreement may require users to do which of the following? [Choose all that apply].

Tailgaiting

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

DNS poisoning

A spoofed DNS record spreads to other DNS servers. What is this attack called?

Choose a device from a limited options usually supplied by school or company

A variant of BYOD, what does CYOD allow employees or students to do?

True

Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

60 days

How often should you require users to change their passwords?

What is NMap used for ?

It is a port-scanning utility that can identify open ports on a host.

Logic bomb ( has to have a certain date to activate but not always malicious)

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Sha256sum

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

True

Over a long-distance connection, using SSH keys is more secure than using passwords.

Authentication, Authorization and Accounting

RADIUS provides AAA services. What does AAA stand for?

True

Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.

True

The day after Patch Tuesday is informally dubbed Exploit Wednesday.

mobile device management software

VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?

Penetration testing ( fine ethical line)

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Metasploit

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

Deauthentication

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

Acceptable use policy

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

SSH

Which of the following is considered a secure protocol?

Remote Authentication Dial-In User Service (RADIUS)

Which of the following networking protocols provide a centralized authentication, authorization and accounting management system for users that connect and use network services?

Nessus

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

Deauthentication attk

Which of these attacks is a form of Wi-Fi DoS attack?

DRDoS ( distributed reflection DoS ) attk

Which type of DoS attack orchestrates an attack using uninfected computers?

To gain access to a password protected system

Why would an attacker perform a brute force attack?

TACACS+

You are required to implement an AAA solution for several services found within the corporate network. Which of the following protocols would you use?

Upgrade the firmware on the wireless router

You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?

Password policy

You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?

Baseline review

You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?

Posture assessment

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?


Ensembles d'études connexes

Chapter 9-Muscles of hand, thumb and fingers

View Set

Land Transportation Office (LTO)

View Set

Chapter 12: Family - Questions Inquisitive and Definitions

View Set

Safety and Infection Control Exam

View Set