Network+ Chapter 8

Your page rank:

Total word count: 582
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Posture assessment

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities? Data breach

Jamming

What wireless attack might a potential hacker execute with a specially configured transmitter?

Buffer overflow

What kind of vulnerability is exploited by a ping of death?

DRDoS (distributed reflector DoS) attack

Which type of DoS attack orchestrates an attack using uninfected computers?

Agent

What software might be installed on a device in order to authenticate it to the network?

Active Directory

What feature of Windows Server allows for agentless authentication?

Content-filtering firewall

What kind of firewall blocks traffic based on application data contained within the packets?

UTM (Unified Threat Management)

What of the following features does not distinguish an NGFW from traditional firewalls?

Layer 7

At what layer of the OSI model do proxy servers operate?

Boot sector viruses

What kind of virus runs in place of the computer’s normal system files?

metasploit

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​

smurf attack​

What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?​

​IRC

Botnets often make use of what chat protocol in order to receive commands?​

​Stoned

​Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

polymorphism

​What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?

logic bomb​

What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​

worms

Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​

​honeynet

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

SIEM system​

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?

​reverse proxy

A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​

Network

At what layer of the OSI model do firewalls operate?​

​iptables

Which software below serves as the firewall for Linux systems?​

​amplification attack

​A reflective attack can be increased in intensity by combining it with what type of attack?

​banner-grabbing attack

An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​

​man-in-the-middle attack

An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

TEMPEST

​Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

phishing

The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?​

dynamic ARP inspection

What feature on some network switches can be used to detect faked arp messages?

0.0.0.0​

​In ACL statements, the any keyword is equivalent to using what wildcard mask below?

​virtual wire mode

What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it’s just part of the wire?​

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending