Module 08 Networking Threats, Assessments, and Defenses

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following sensors can detect an object that enters the sensor's field? a. Object recognition b. Proximity c. Field detection d. IR verification

b. Proximity

Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior? a. Wireshark b. Tcpreplay c. Packetdump d. Tcpdump

b. Tcpreplay

Which of the following is NOT a Microsoft defense against macros? a. Protected View b. Trusted domain c. Trusted location d. Trusted documents

b. Trusted domain

Which utility sends custom TCP/IP packets? a. pingpacket b. curl c. hping d. shape

c. hping

Which of the following is NOT a reason that threat actors use PowerShell for attacks? a. It leaves behind no evidence on a hard drive. b. It can be invoked prior to system boot. c. Most applications flag it as a trusted application. d. It cannot be detected by antimalware running on the computer.

b. It can be invoked prior to system boot.

which of the following is a third-party OS penetration testing tool? a. scanless b. sn1per c. theHarvester d. Nessus

b. sn1per

What is the difference between a DoS and a DDoS attack? a. DoS attacks use more memory than DDoS attacks. b. DoS attacks are faster than DDoS attacks. c. DoS attacks do not use DNS servers as DDoS attacks do. d. DoS attacks use fewer computers than DDoS attacks.

d. DoS attacks use fewer computers than DDoS attacks.

Which attack intercepts communications between a web browser and the underlying OS? a. Man-in-the-browser (MITB) b. Interception c. DIG d. ARP poisoning

a. Man-in-the-browser (MITB)

What is the result of an ARP poisoning attack? a. The ARP cache is compromised. b. MAC addresses are altered. c. An internal DNS must be used instead of an external DNS. d. Users cannot reach a DNS server.

a. The ARP cache is compromised.

What is Bash? a. The command-language interpreter for Linux/UNIX OSs b. The underlying platform on which macOS is built c. The open source scripting language that contains many vulnerabilities d. A substitute for SSH Hide Feedback

a. The command-language interpreter for Linux/UNIX OSs

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use? a. cat b. show c. head d. display

a. cat

Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing? a. Compromise mitigation assessment (CMA) b. Two-person integrity/control c. Multiplayer recognition d. Dual observation protocol (DOP)

b. Two-person integrity/control

Which of the following does NOT describe an area that separates threat actors from defenders? a. Air gap b. Secure area c. Containment space d. DMZ

c. Containment space

Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use? a. Use the latest version of Python. b. Use caution when formatting strings. c. Only use compiled and not interpreted Python code. d. Download only vetted libraries.

c. Only use compiled and not interpreted Python code.

Gregory wants to look at the details about the patch a packet takes from his Linux computer to another device. Which Linux command-line utility will he use? a. tracepacket b. trace c. traceroute d. tracert

c. traceroute

Tomaso is explaining to a colleague the different types DNS attacks. Which DNS attack would only impact a single user? a. DNS hijack attack b. DNS overflow attack c. DNS resource attack

d. DNS poisoning attack

Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect? a. Web browser and browser add-on b. Reply referrer and domain buffer c. Web server buffer and host DNS server d. Host table and external DNS server

d. Host table and external DNS server

Which of the following is NOT true about VBA? a. It is included in select non-Microsoft products. b. It is built into most Microsoft Office applications. c. It is commonly used to create macros. d. It is being phased out and replaced by PowerShell.

d. It is being phased out and replaced by PowerShell.

Deacon has observed that the switch is broadcasting all packets to all devices. He suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this? a. MAC cloning attack b. MAC overflow attack c. MAC spoofing attack d. MAC flooding attack

d. MAC flooding attack

Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack? a. IoT b. Network c. Application d. Operational Technology

d. Operational Technology


Set pelajaran terkait

7 - Life Insurance Underwriting and Policy Issue

View Set

Ch. 13 Med-Surg: Palliative and End-of-Life Care

View Set

Answering Multiple Choice Questions

View Set

Mental Health CH 1 Pre, Post, NCLEX, Interactive Review & Chapter

View Set

Bible Doctrine: Memory Verse Quiz

View Set

Adult Gero Exam Cardiovascular ATI

View Set

五年级 2021 数学 单元一:整数与运算 (试卷一) (b)

View Set