Network CH 9
distributed reflection denial-of-service attack
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
Phishing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
NDA
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
True
A drop ceiling could be used by an intruder to gain access to a secured room.
Insider threat
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Require minimum number of characters & Require at least one of different kinds of characters (numbers, capital letters)
A password policy as part of a network user agreement may require users to do which of the following? [Choose all that apply].
Tailgaiting
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
DNS poisoning
A spoofed DNS record spreads to other DNS servers. What is this attack called?
Choose a device from a limited options usually supplied by school or company
A variant of BYOD, what does CYOD allow employees or students to do?
True
Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.
60 days
How often should you require users to change their passwords?
What is NMap used for ?
It is a port-scanning utility that can identify open ports on a host.
Logic bomb ( has to have a certain date to activate but not always malicious)
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Sha256sum
On a Linux based system, what command can you use to create a hash of a file using SHA-256?
True
Over a long-distance connection, using SSH keys is more secure than using passwords.
Authentication, Authorization and Accounting
RADIUS provides AAA services. What does AAA stand for?
True
Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.
True
The day after Patch Tuesday is informally dubbed Exploit Wednesday.
mobile device management software
VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?
Penetration testing ( fine ethical line)
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Metasploit
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?
Deauthentication
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?
Acceptable use policy
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
SSH
Which of the following is considered a secure protocol?
Remote Authentication Dial-In User Service (RADIUS)
Which of the following networking protocols provide a centralized authentication, authorization and accounting management system for users that connect and use network services?
Nessus
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?
Deauthentication attk
Which of these attacks is a form of Wi-Fi DoS attack?
DRDoS ( distributed reflection DoS ) attk
Which type of DoS attack orchestrates an attack using uninfected computers?
To gain access to a password protected system
Why would an attacker perform a brute force attack?
TACACS+
You are required to implement an AAA solution for several services found within the corporate network. Which of the following protocols would you use?
Upgrade the firmware on the wireless router
You have been using a wireless router at home. You get an E-mail from the manufacturer that the same router now has been provided with new functionality in its admin interface. You want to get this functionality on the same router without losing existing configuration. What should you do with minimum administrative effort?
Password policy
You have recently shared a document with the user that mentions the need and set of rules for creating credentials of appropriate complexity. Which document is this?
Baseline review
You have recently upgraded your network. Which method will help you to track its improvements to ensure accurate comparison of the performance?
Posture assessment
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?