Networking Threats, Assessments, and Defenses (Unit 8 Review) - [Network Security]
Which of the following can be used to detect malicious activities? [Choose all that apply]
1. Alarms 2. CCTV Cameras
In an organization, in which of the following places would you avoid installing a fire suppression system? [Choose all that apply]
1. Datacenter 2. Server Room
Which of the following type of security control are CCTV cameras? [Choose all that apply]
1. Deterrent 2. Detective
Which of the following tools can be used to conduct a Distributed Denial-of-Service (DDoS) attack? [Choose all that apply]
1. Nemesy 2. DAVOSET 3. HTTP Unbearable Load King (HULK) 4. UDP Flooder
Which of the following does NOT describe an area that separates threat actors from defenders?
Containment space
Which of the following attack is also known as DNS spoofing?
DNS poisoning
Tomaso is explaining to a colleague the different types DNS attacks. Which DNS attack would only impact a single user?
DNS poisoning attack
Which of the following type of security controls involves installing bollards?
Deterrent
What does the arp -a command do?
Displays arp cache
What is the difference between a DoS and a DDoS attack?
DoS attacks use fewer computers than DDoS attacks.
Calix was asked to protect a system from a potential attack on DNS. What are the locations he would need to protect?
Host table and external DNS server
Which of the following is NOT a reason that threat actors use PowerShell for attacks?
It can be invoked prior to system boot.
Which of the following is NOT true about VBA?
It is being phased out and replaced by PowerShell.
Which of the following is globally unique in the system?
MAC address
Deacon has observed that the switch is broadcasting all packets to all devices. He suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack is this?
MAC flooding attack
Which of the following can be triggered when a document opens?
Macro
Which attack intercepts communications between a web browser and the underlying OS?
Man-in-the-browser (MITB)
Which of the following can be used to detect if a Trojan has infected a system?
Netstat
Theo uses the Python programming language and does not want his code to contain vulnerabilities. Which of the following best practices would Theo NOT use?
Only use compiled and not interpreted Python code.
Which of the following is an open source toolkit used to implement the SSLv3 and TLS v1 protocols?
OpenSSL
Proteus has been asked to secure endpoints that can be programmed and have an IP address so that they cannot be used in a DDoS attack. What is the name for this source of DDoS attack?
Operational Technology
If you are using a USB data blocker, which type of security control are you using?
Preventive
Which of the following sensors can detect an object that enters the sensor's field?
Proximity
Which of the following is used to target SSL-enabled sessions and non-SSL-enabled links to sniff their contents?
SSL Strip
Which of the following is a tool for editing packets and then putting the packets back onto the network to observe their behavior?
Tcpreplay
What is the result of an ARP poisoning attack?
The ARP cache is compromised.
What is Bash?
The command-language interpreter for Linux/UNIX OSs
Which of the following is NOT a Microsoft defense against macros?
Trusted domain
Estevan has recommended that the organization hire and deploy two security guards in the control room to limit the effect if one of the guards has been compromised. What is Estevan proposing?
Two-person integrity/control
Which of the following tool can be used to automate the setup of an evil twin?
Wi-Fi Pineapple
You want to clear the arp cache. Which command would you use?
arp -d
You want to add an entry to the ARP table. Which command would you use?
arp -s (IP address and MAC address)
Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?
cat
Which utility sends custom TCP/IP packets?
hping
Which of the following nmap command is used for file-exclusion?
nmap -iL /tmp/scanlist.txt --excludefile /tmp/exclude.txt
Which of the following command is used to detect OS on a target?
nmap -o
Which of the following command is used to perform FIN scan?
nmap -sF
Which of the following command is used to perform xmas tree scan?
nmap -sX -v
Which of the following is a third-party OS penetration testing tool?
sn1per
Gregory wants to look at the details about the patch a packet takes from his Linux computer to another device. Which Linux command-line utility will he use?
traceroute