Security + Mod 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Host table and external DNS server

Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?

cat

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

traceroute

Gregory wants to look at the details about the patch a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?

Operational Technology

Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?

Only use compiled and not interpreted Python code.

Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use?

DNS poisoning attack

Tomaso is explaining to a colleague the different types DNS attacks. Which DNS attack would only impact a single user?

The command-language interpreter for Linux/UNIX OSs

What is Bash?

DoS attacks use fewer computers than DDoS attacks.

What is the difference between a DoS and a DDoS attack?

The ARP cache is compromised

What is the result of an ARP poisoning attack?

Man-in-the-browser (MITB)

Which attack intercepts communications between a web browser and the underlying OS?

Containment space

Which of the following does NOT describe an area that separates threat actors from defenders?

Trusted domain

Which of the following is NOT a Microsoft defense against macros?

It can be invoked prior to system boot.

Which of the following is NOT a reason that threat actors use PowerShell for attacks?

It is being phased out and replaced by PowerShell.

Which of the following is NOT true about VBA?

sn1per

Which of the following is a third-party OS penetration testing tool?

Tcpreplay

Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior?

MAC flooding attack

Deacon has observed that the switch is broadcasting all packets to all devices. He suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this?

Two-person integrity/control

Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?

Proximity

Which of the following sensors can detect an object that enters the sensor's field?

hping

Which utility sends custom TCP/IP packets?


Set pelajaran terkait

Chapter 6, public speaking chapter 6

View Set

Chapter 11: Nutrition for Physically Active Lifestyles

View Set

B.T - Construction Materials and Construction Methods

View Set

8:, 7: body weight & body composition, Fitness, 5: Nutrition, 4: Sleep, 3: Mental Health and Stress, 2: Infectious Diseases, 1: Self, Family, Community

View Set

Chapter 3 - Surveying the Books of the Bible

View Set

Chapter 19: Heart and Neck Vessels

View Set