Quiz 1, 2
___________________ is an attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.
Disassociation
Separation of duties polices are designed to reduce the risk of what? Group of answer choices
Fraud
Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.
TACACS+
To prevent files from being copied on a workstation to removable media, you should disable which ports?
USB
Whether your server operating system can force the change of a password is considered what kind of a security issue?
operational
A firewall operating as a ___________________ firewall will pass or block packets based on their application or TCP port number.
packet filter
Which of the following devices are the first line of defense for networks connected to the Internet?
firewalls
If SLE is calculated at $2,500 and there are an anticipated 4 occurrences a year (ARO), then ALE is:
10,000
A ___________________ is a system designed to fool attackers into thinking a system is unsecured so they will attack it. Then the "victim" will learn their attack methods without compromising a live system. Group of answer choices
Honey pot
Which of the following is not a routing protocol?
ICMP
Wireless Ethernet conforms to which IEEE standard?
IEEE 802.11
Which of the following is a series of standards that define procedures for implementing electronically secure industrial automation and control systems?
ISA/IEC-62443
A(n) ___________________ is a broad term that applies to a wide range of systems used to manage information security. Group of answer choices
ISMS
When assigning permissions to users, which principle should you adhere to?
Least privilege
Which of the following is a passive method of threat response? Group of answer choices
Logging the event
Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?
MAC
Which type of risk strategy is undertaken when you attempt to reduce the risk? Group of answer choices
Mitigation
When the entire network, including all security devices, is virtualized, this is known as:
SDN
Which authentication method uses a key distribution center (KCD)?
kerberos
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?
evil twin