Network+ ch 8 – Network Risk Management

Your page rank:

Total word count: 597
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Which software below serves as the firewall for Linux systems?

iptables

"If multiple honeypots are connected to form a larger network, what term is used to describe the network?"

honeynet

"What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?"

polymorphism

What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners’ knowledge or consent?

zombie army and botnet

What two types of agents are used to check compliance with network security policies?

dissolvable agent, persistent agent

A SOHO wireless router typically acts as a firewall and may include packet filtering options.

True

"Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?"

worms

The term malware is derived from a combination of the words malicious and software.

True

An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

man-in-the-middle attack

Botnets often make use of what chat protocol in order to receive commands?

IRC

Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

TEMPEST

The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?

phishing

A reflective attack can be increased in intensity by combining it with what type of attack?

amplification attack

"What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?"

logic bomb

Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

Natas

"A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?"

SIEM system

Which two viruses below are examples of boot sector viruses?

Stoned, Michelangelo

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?

metasploit

"In ACL statements, the any keyword is equivalent to using which wildcard mask?"

0.0.0.0

A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

reverse proxy

Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?

honeypot, lure

An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?

banner-grabbing attack

At what layer of the OSI model do packet filtering firewalls operate?

Network

The simplest type of firewall is a content filtering firewall.

False

What two options below are IDS implementations used to provide additional security on a network?

NIDS, HIDS

Different types of organizations have similar levels of network security risks.

False

"What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?"

smurf attack

A firewall typically involves a combination of hardware and software.

True

What feature on some network switches can be used to detect faked arp messages?

dynamic ARP inspection

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire?

virtual wire mode

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending