ECE Fund of Cybersecurity and Info Security: Ch 10 and 11
What file type is least likely to be impacted by a file infector virus? .exe .dll .com .docx
.docx
What ISO security standard can help guide the creation of an organization's security policy? 12333 42053 27002 17259
27002
Norm recently joined a new organization. He noticed that the firewall technology used by his new firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used? Network address translation Packet filtering Stateful inspection Application proxying
Application proxying
What program, released in 2013, is an example of ransomware? BitLocker CryptoVault Crypt0L0cker FileVault
Crypt0L0cker
A smurf attack tricks users into providing logon information on what appears to be a legitimate website but is in fact a website set up by an attacker to obtain this information. True or False
False
What is NOT a common motivation for attackers? Fame Revenge Fear Money
Fear
Terry is troubleshooting a network that is experiencing high traffic congestion issues. Which device, if present on the network, should be replaced to alleviate these issues? Firewall Hub Switch Router
Hub
Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block? Internet Control Message Protocol (ICMP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Hilda is troubleshooting a problem with the encryption of data. At which layer of the OSI Reference Model is she working? Application Data Link Presentation Session
Presentation
Barbara is investigating an attack against her network. She notices that the Internet Control Message Protocol (ICMP) echo replies coming into her network far exceed the ICMP echo requests leaving her network. What type of attack is likely taking place? Smurf Cross-site scripting (XSS) Land Teardrop
Smurf
A network protocol governs how networking equipment interacts to deliver data across the network. True or False
True
Internet Small Computer System Interface (iSCSI) is a storage networking standard used to link data storage devices to networks using IP for its transport layer. True or False
True
It is common for rootkits to modify parts of the operating system to conceal traces of their presence. True or False
True
What is NOT a typical sign of virus activity on a system? Unexplained decrease in available disk space Unexpected power failures Sudden sluggishness of applications Unexpected error messages
Unexpected power failures
Val would like to isolate several systems belonging to the product development group from other systems on the network, without adding new hardware. What technology can she use? Transport Layer Security (TLS) Firewall Virtual LAN (VLAN) Virtual private network (VPN)
Virtual LAN (VLAN)
Gary is configuring a Smartphone and is selecting a wireless connectivity method. Which approach will provide him with the highest speed wireless connectivity? 3G Digital subscriber line (DSL) Wi-Fi 4G
Wi-Fi
What wireless security technology contains significant flaws and should never be used? Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) WPA2 Remote Authentication Dial-In User Service (RADIUS)
Wired Equivalent Privacy (WEP)
Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database? SQL injection Cross-site scripting (XSS) XML injection LDAP injection
SQL injection
Gwen is investigating an attack. An intruder managed to take over the identity of a user who was legitimately logged into Gwen's company's website by manipulating Hypertext Transfer Protocol (HTTP) headers. Which type of attack likely took place? SQL injection XML injection Cross-site scripting Session hijacking
Session hijacking
Henry would like to create a different firewall rule that allows encrypted web traffic to reach a web server. What port is used for that communication? 143 3389 443 80
443