QUIZ 3 (CH 5-6)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

Which statement describes a difference between RADIUS and TACACS+?

RADIUS encrypts only the password whereas TACACS+ encrypts all communication.

True or False? A WLAN frame sent by a wireless client is formatted differently than a wired Ethernet frame.

true

A network administrator detects unknown sessions involving port 21 on the network. What could be causing this security breach?

An FTP Trojan horse is executing

Which example illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

What type of attack uses zombies?

DDoS

What specialized network device uses signatures to detect patterns in network traffic?

IDS

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

Which tool is used to provide a list of open ports on network devices?

Nmap

Which network service allows administrators to monitor and manage network devices?

SNMP

The _________ layer of the three-layer network design model aggregates data from the access layer.

distribution

True or False? A standard ACL filters network traffic based on the destination MAC address.

false

True or False? The primary objective of a DoS attack is to penetrate systems and steal data.

false

What specialized network device is responsible for enforcing access control policies between networks?

firewall

Which device is an intermediary device?

firewall

Which type of attack allows an attacker to use a brute force approach?

password cracking

Which term is used to describe the act of sending an email message in an attempt to divulge sensitive information from someone?

phishing

What information does an Ethernet switch examine and use to build its address table?

source MAC address

What type of physical topology can be created by connecting all Ethernet cables to a central device?

star

A ___________ route is created when a network administrator manually configures a route and the exit interface is active.

static

What is the purpose of a reconnaissance attack on a computer network?

to gather information about the target network and system

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus


Ensembles d'études connexes

MO 48 Hour Real Estate Review 2

View Set

DOG Week 34, 21, and 20 Vocab Mexico Minerals, Central America, and The West Indies

View Set