Ch 13 exam

Ace your homework & exams now with Quizwiz!

MD5 - Message Digest 5

A one-way hashing algorithm that produces a 128-bit hash.

proxy firewall

A proxy server that also acts as a firewall, blocking network access from external networks.

What would cause a Microsoft Windows update to fail?

A required prior update was not installed.

Secure Hash Algorithm (SHA)

A secure hash algorithm that creates more secure hash values than Message Digest (MD) algorithms.

Application layer

All packets traveling to or from an application are intercepted. All unwanted outside traffic is prevented from reaching protected devices.

Refer to the exhibit. Which type of workstation password is being used?

BIOS

A technician has recently changed jobs from supporting a small company to a large company in the security group. What are two types of passwords the larger company could use to secure a workstation? (Choose two.)

BIOS login

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

Which action could be used to determine if a host is compromised and flooding traffic onto the network?

Disconnect the host from the network.

DDoS Attack

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

13.4.1

Hardware firewalls can be configured as packet filters, application layer firewalls, or proxies. Application layer firewalls read all of the traffic data and look for unwanted traffic. Proxies act as relays, scanning traffic and allowing or denying traffic based on established rules. Packet filters only concern themselves with port data, IP address data, and destination services.

A technician is configuring rights and permissions in Windows 7. Which tool will the technician use?

Local Users and Groups

Packet filter

Packets cannot pass through the firewall, unless they match the established rule set configured in the firewall. Traffic can be filtered based on different attributes, such as source IP address, source port or destination IP address or port.

Refer to curriculum topic: 13.1.4

Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.

tateful packet inspection (SPI)

This is a firewall that keeps track of the state of network connections traveling through the firewall. Packets that are not part of a known connection are dropped.

A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?

acceptable use policies

A technician has been asked by a manager to recommend a security solution for protecting a computer against adware programs. Which security technique should the technician recommend?

antimalware

ActiveX Filtering

blocks ActiveX controls, which are created for interactivity on the Web and commonly used on sites that display animations or offer multimedia such as videos.

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

data encryption

SmartScreen Filter

detects threats on Web sites, such as phishing attacks and malware downloads, and prevents them from running

Which type of security threat uses email that appears to be from a legitimate sender and asks the email recipient to visit a website to enter confidential information?

phishing

Which two characteristics of network traffic are being monitored if a network technician configures the company firewall to operate as a packet filter? (Choo

protocols ports

Which type of firewall serves as a relay between users and servers on the Internet, inspects all traffic, and allows or denies traffic based on a set of rules?

proxy firewall

Refer to the exhibit. The security policy of an organization allows employees to connect to the office intranet from their homes. Which type of security policy is this?

remote access

A high technology company has an issue with unauthorized people gaining access into the company by following an authorized employee through the secure entrance. Which two measures could help with this security breach? (Choose two.)

security guard that checks IDs mantrap

Which two algorithms are used for hash encoding to guarantee the integrity of data? (Choose two.)

SHA MD5

A newly created company has fifteen Windows 10 computers that need to be installed before the company can open for business. What is a best practice that the technician should implement when configuring the Windows Firewall?

After implementing third party security software for the company, the technician should verify that the Windows Firewall is disabled.


Related study sets

Ch 15 Infectious or Communicable Disorder

View Set

Financial Accounting - Chapter 13: Statement of Cash Flows

View Set

Art History Survey 2 - Final Exam

View Set

Introduction to Physical Security PY011.16 (26 Aug 2021)

View Set

emt exam 3, chapter 29-35, emt basic

View Set

Cost Accounting Exam 1 Chapters 1-4

View Set