Network Defernse Final

Ace your homework & exams now with Quizwiz!

What IP address is used as a loopback address and is not a valid IP address that can be assigned to a network?

127 address

Approximately how many IP addresses are allowed under IPv4?

4.3 billion

An individual wants to switch from using Hypertext Transfer Protocol (HTTP) to a more secure protocol. To which port are they most likely to switch?

443

What is the largest digit in an octal number?

7

What is a SOA record?

A Start of Authority (SOA) record shows for which zones or IP addresses a DNS server is responsible.

A network engineer is setting up a new firewall. It is a new generation firewall that has the capabilities of detecting unusual activity and automatically blocking it. What feature does the new firewall have?

Active IDS.

Which of the following is not a security tool that can be used for web application testing?

ActiveX

Which of the following is a possibility when you work as a security professional?

All are possibilities.

Which of the following actions could be prosecuted under the Stored Wire and Electronic Communications and Transactional Records Act?

An authorized employee of the FBI accesses classified records. An individual downloads copyrighted movies and makes copies for friends. Missed Option - Incorrect A security contractor accesses computers that have classified information without authorization. An employee of a company copies records without permission with intent to sell the records to a competitor. The Stored Wire and Electronic Communications and Transactional Records Act defines unauthorized access to computers that store classified information.

Why should security professionals have at least a little knowledge about the Apache Web Server?

Apache Web Server is said to run more Web servers than IIS.

Which of the following can be used as a countermeasure for wireless attacks?

Assign static IP addresses to wireless clients.

What tool included with Kali Linux allows you to intercept traffic between the web browser and the server so you can inspect and manipulate requests before sending them to the server?

Burp Suite

Which of the following is the interface that determines how a Web server passes data to a Web browser?

CGI

Which class of IP addresses are reserved for multicast and experimental addressing?

Class D and Class E

What advanced professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

CompTIA Security+

What type of testing procedure involves the tester(s) analyzing the company's security policy and procedures, and reporting any vulnerabilities to management?

Correct answer: security test

To access a database from an ASP webpage, what initial step must be completed?

Create an ADO connection to the database to be accessed.

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

DMZ.

What area of a network is a major area of potential vulnerability because of the use of URLs?

DNS

What may occur when a broadcast address is mistaken as a valid host address?

Denial-of-service attack.

Which of the following activities is not illegal?

Discovering passwords of company personnel when testing for vulnerabilities

Which of the following application tests analyzes a running application for vulnerabilities?

Dynamic Application Security Testing

To make it more difficult for wardrivers to discover your WLAN, you can use what?

EAP

An attacker is using Wireshark to capture network communications. Later these captured packets are reconstructed, and the attacker searches for confidential information that can be used to extend the attack. What malicious procedure is occuring?

Eavesdropping

Aircrack-ng has some useful add-ons, including a GUI front-end known as what?

Fern WIFI Cracker

Which of the following is not an essential component of a wireless network?

Firewall

What type of general commands allow a security tester to pull information from a server using a web browser?

HTTP

What specific term does the U.S. Department of Justice use to label all illegal access to computer or network systems?

Hacking

What is the difference between penetration tests and security tests?

In a penetration test, an ethical hacker attempts to break into a company's network or applications to find weak links. In a security test, testers do more than attempt to break in; they also analyze a company's security policy and procedures and report any vulnerabilities to management.

What advantage does subnetting offer?

Increased security.

What layer, in the TCP/IP stack, is responsible for routing a packet to a destination address?

Internet

What makes a honeypot hard for an attacker to avoid?

It mimics valuable systems.

Why might companies prefer black box testing over white box testing?

Many companies don't want a false sense of security.

No matter how efficient a company's firewalls or intrusion detection systems are, an attacker can bypass supposed security boundaries as well as any OS hardening that network administrators have done. What makes this possible?

Most systems allow the content of HTTPS traffic.

In the TCP/IP stack, what layer is concerned with physically moving bits across the network's medium?

Network

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Network security

What type of IDS's monitor activity on network segments by sniffing traffic as it flows over the network?

Network-based.

What term references half a byte?

Nibble

Which of the following interfaces is a standard database access method, developed by SQL Access Group, that allows an application to access data stored in a database management system (DBMS)?

ODBC

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people in the facility. What is one of these methods?

Paint the walls with a special paint that prevents radio-wave leakage.

A network engineer is setting up a new firewall. It is a new generation firewall that has the capabilities of only detecting anomalous activity. What feature does the new firewall have?

Passive IDS

What port would a successful Trojan program most likely use?

Port 53

What is a logical goal for security professionals?

Protect a network and make it difficult for attackers to break into it.

Which of the following Cisco router components holds the router's running configuration, routing tables, and buffers; this information is lost if the router is turned off?

RAM.

What kind of storage do Cisco routers store a minimal version of IOS in case it gets corrupted?

Read-only memory

What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for moving those packets?

Router.

An application can be tested using two main techniques: Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). How do these two techniques differ?

SAST is a reliable way to enumerate most application vulnerabilities that result from coding errors.

Why is it advised to dedicate more time learning about wireless technology connected to a wired network than wireless technology not connected to a wired network?

Security testers are seldom contracted to secure a peer-to-peer wireless network.

What type of network attack relies on guessing a TCP header's initial sequence number, or ISN?

Session Hijacking

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

Session hijacking

Why are hackers able to bypass some security systems using IPv6?

Some router-filtering devices, firewalls, and intrusion detection systems (IDSs) are not configured to enable IPv6.

A standard IP access list is restricted to what kind of IP address?

Source.

Which of the following is an automated way to discover pages of a website by following links?

Spidering

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

Spyware

Which of the following application tests analyzes an application's source code for vulnerabilities, and is therefore only possible when the source code of an application is available?

Static Application Security Testing

What can be inferred about successful security professionals?

Successful security professionals have a combination of technical and soft skills.

What is an example of an open-source honeypot system?

T-Pot.

How can computer criminals use the Whois utility for their purposes?

The Whois utility is a commonly used tool for gathering IP address and domain information.

What numbering system is used by computer engineers to make computers, and why was this numbering system selected?

The binary number system was chosen because logic chips make binary decisions (true/false, on/off)

How do spyware and adware differ?

The main purpose of adware is to determine a user's purchasing habits, but spyware sends information, including confidential information, from the infected computer to the attacker.

Even though a security professional might think they are following the requirements set forth by the client who hired them to perform a security test, management may be dissatisfied. Which of the following is an example of an ethical hacking situation that might upset a manager?

The security testing reveals all the usernames and passwords of company personnel to the tester without the manager's prior consent.

What is true regarding physical network security?

There's a higher chance of threat from insiders within a company versus outsiders.

What is the purpose of creating a "Security Operations Center"?

To offload security tasks and policy decisions to a dedicated team.

Which of the following is not an example of social engineering?

Training: Requiring employees to attend annual security training.

What does the acronym TCP represent?

Transmission Control Protocol

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

Transport

What type of malicious computer programs present themselves as useful computer programs or applications?

Trojan programs

What type of device is a single device that combines many network protection functions, such as those performed by routers, firewalls, VPNs, and prevention systems?

UTM.

When you first log on to a Cisco router, you are in what mode?

User.

The most insidious attacks against networks and computers worldwide take place via Trojan programs. Why do Trojan attacks continue to occur?

Users simply click Allow when warned about suspicious activity on a port

Why have some judges dismissed charges for those accused of port scanning?

Usually, no damages are done when port scanning. Networks are private property. Some states consider port scanning as noninvasive or nondestructive in nature.

Why is creating a virtual directory recommended?

Virtual directories enhance security.

Which of the following statements is true?

WLANs can be attacked with many of the same tools used for hacking wired LANs.

Which of the following is true about WEP with 40-bit encryption and WEP with 104-bit encryption?

WPA is more secure than both WEP with 40-bit encryption and WEP with 104-bit encryption.

WPA3 was released in January 2018. What benefit does WPA3 offer over older versions?

WPA3 improves security over public Wi-Fi networks.

Wi-Fi Protected Setup (WPS) is a wireless authentication standard created to allow users to add devices easily and securely to a wireless network. How does WPS make this process easier?

WPS allows a user to press a button on the router and the WPS-enabled device pairs with the router.

Glastopf was specifically made to look like what kind of system?

Web Server.

What is the greatest advantage of whitelisting?

Whitelisting helps prevent malicious code from being introduced into corporate networks.

Which of the following is not a method of preventing a buffer overflow attack?

Write code quickly and use as few computer resources as possible.

All of the following are good resources for finding more information about contracts for independent security consultants except one. Which is the exception?

Your own attorney

What footprinting tool would be most helpful in determining network vulnerabilities?

Zed Attack Proxy

What utility can be used to intercept detailed information from a company's website?

Zed Attack Proxy

What skill is most important when developing a written agreement between a security professional and a company that will be hiring them to execute a security assessment?

an understanding of the laws that apply to your location

What is the specific act of checking a user's privileges to understand if they should or should not have access to a page, field, resource, or action in an application?

authorization

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?

black box

Which of the following attacks occurs when a programmer exploits written code that doesn't check for a defined amount of memory space?

buffer overflow

To check whether a CGI program works, you can test the URL in your Web browser. Which of the following directories should you save the program to on your Web server before you check the URL in your Web browser?

cgi-bin

When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack" the company's network, they should proceed by performing what precautionary step?

consult their lawyer

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

denial-of-service

What type of useful tools can a security tester find available in both Firefox and Chrome Web browsers?

developer tools

In *nix systems, the nslookup command has been replaced by which recommended command?

dig

Which of the following protocols is an enhancement to PPP, and was designed to allow a company to select its authentication method?

eap

Which of the following terms is the rate at which a sound wave repeats?

frequency

Which term best describes malicious programmatic behaviors of known viruses that antivirus software companies compare to every file on a computer?

heuristics

Which of the following is a computer placed on the network perimeter with the main goal of distracting hackers from attacking legitimate network resources?

honeypot

Which of the following results from poorly configured technologies that a Web application runs on top of?

security misconfigurations

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

spear phishing

In 802.11, which of the following is an addressable unit?

station (STA)

In 802.1X, what component refers specifically to the wireless user attempting access to a WLAN?

supplicant

What line of defense allows only approved programs to run on a computer?

whitelisting


Related study sets

ACE Personal Trainer - Practice Exam #2

View Set

NUR 209 Ch. 23 Asepsis (Fundamentals of Nursing)

View Set

Microbiology, Ch 26, Nester's 9th

View Set

Regulations: Securities Exchange Act of 1934

View Set