MIS 1

Ace your homework & exams now with Quizwiz!

DNS

This protocol is responsible for matching a domain name (i.e., baylor.edu) with an IP address.

true

A man-in-the-middle attack takes advantage of the multihop process used by many types of networks.

Transport, Segmenting the Data

From a security perspective, if you walk the same route to and from a location every single day you become predictable and stalker can follow you. We defend this predictability in which layer of the OSI and how is this accomplished?

Payment Card Industry Data Security Standard (PCI DSS)

Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity and includes provisions that Gwen should implement before accepting credit card transactions?

False

In the IP header, the destination port identifies which service will be needed.

True

In the Zero Trust Extended Framework, the premise of the model is that minimum levels of trust are extended to people, workloads, devices, and networks.

true

Interoperability is the idea that a mobile node can work with foreign agents seamlessly for the user.

false

IoT was advanced by extreme decentralization, mobile network connectivity, and then again extreme decentralization (i.e., moving to the cloud).

False

Malicious code, in singularity, cannot attack all three tenets of the CIA triad.

22

Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, encrypted connections?

true

Moore's Law indicates that computing power will continually get faster and cheaper.

Confidentiality

Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.

False

Trojans are self-contained programs designed to propagate from one host machine to another using the host's own network communications protocols.

WAN

What type of network connects systems over the largest geographic area?

Threats

Which of the following do cybersecurity departments have the least control over?

interception and modification

You are an intrusion detection specialist and you notice that data going in and out on port 25 is being truncated. You suspect that the attacker is conducting a multi-categorical attack involving:

Data Link, 9C-S1-3X-B4-A7-6F, unique

A MAC Address is a unique address that operates on _______________ layer, this could be an example of one ______________, and it is _____________.

false

A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

filtered, DNS

A logical configuration for port 53 would be to set the status at _____________ since ____________ can be manipulated leading to misdirection of users in the network to potentially malicious websites if configured illogically.

true

TCP/IP is a suite of protocols that operates at both the Network and Transport layers of the OSI Reference Model.

true

The System/Application Domain holds all the mission-critical systems, applications, and data.

true

The director of IT security is generally in charge of ensuring that the Workstation Domain conforms to policy.

false

The main difference between a virus and a worm is that a virus does not need a host program to infect.

true

The term "router" describes a device that connects two or more networks and selectively interchanges packets of data between them.

True

The three main categories of network security risk are reconnaissance, eavesdropping, and denial of service.

Ransomware

This type of attack uses encryption as an attack method rather than a countermeasure.

whaling

This type of socially engineered attack spills over into the personal and business domains and requires the attacker to invest a significant amount of time and money to receive on one time large lump sum payment from a high-level executive or someone that controls significant resources.


Related study sets

Chapter 10: CHNAGE in organizations

View Set

Module 8 War and Expansion in America

View Set

Ambulatory - Int Med Case File Questions

View Set

Chapter 21: Genomes, Proteomes, and Bioinformatics

View Set

NMT exam symptoms: Sciatica, low back pain, knee pain, plantar fasciitis, hip pain, ankle pain

View Set

*Series 6 : Investment Company and Tax Concepts Practice Questions

View Set