Which software below serves as the firewall for Linux systems? |
iptables |
"If multiple honeypots are connected to form a larger network, what term is used to describe the network?" |
honeynet |
"What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?" |
polymorphism |
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners’ knowledge or consent? |
zombie army and botnet |
What two types of agents are used to check compliance with network security policies? |
dissolvable agent, persistent agent |
A SOHO wireless router typically acts as a firewall and may include packet filtering options. |
True |
"Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?" |
worms |
The term malware is derived from a combination of the words malicious and software. |
True |
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack? |
man-in-the-middle attack |
Botnets often make use of what chat protocol in order to receive commands? |
IRC |
Which option below is a standard created by the NSA that defines protections against radio frequency emanations? |
TEMPEST |
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below? |
phishing |
A reflective attack can be increased in intensity by combining it with what type of attack? |
amplification attack |
"What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?" |
logic bomb |
Which virus below combines polymorphism and stealth techniques to create a very destructive virus? |
Natas |
"A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?" |
SIEM system |
Which two viruses below are examples of boot sector viruses? |
Stoned, Michelangelo |
Which software below combines known scanning techniques and exploits to allow for hybrid exploits? |
metasploit |
"In ACL statements, the any keyword is equivalent to using which wildcard mask?" |
0.0.0.0 |
A proxy that provides Internet clients access to services on its own network is known as what type of proxy? |
reverse proxy |
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers? |
honeypot, lure |
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below? |
banner-grabbing attack |
At what layer of the OSI model do packet filtering firewalls operate? |
Network |
The simplest type of firewall is a content filtering firewall. |
False |
What two options below are IDS implementations used to provide additional security on a network? |
NIDS, HIDS |
Different types of organizations have similar levels of network security risks. |
False |
"What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?" |
smurf attack |
A firewall typically involves a combination of hardware and software. |
True |
What feature on some network switches can be used to detect faked arp messages? |
dynamic ARP inspection |
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire? |
virtual wire mode |
Network+ ch 8 – Network Risk Management
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price