How does the CVE standard make network security devices and tools more effective? |
c. they can share information about attack signatures |
In which type of scan does an attacker scan only ports that are commonly used by specific programs? |
b. strobe scan |
Of what category of attack is a DoS attack an example? |
b. multiple-packet attack |
Under which attack category does a UNIX Sendmail exploitation fall? |
d. suspicious data payload |
Under which suspicious traffic signature category would a port scan fall? |
a. reconnaissance |
What can an IDPS check to try to determine whether a packet has been tampered with or damaged in transit? |
a. checksum |
What is the packet called where a Web browser sends a request to the Web server for Web page data? |
b. HTTP GET |
What is the sequence of packets for a successful three-way handshake? |
b. SYN, SYN ACK, ACK |
What is the term used when an IDPS doesn’t recognize that an attack is underway? |
c. false negative |
What is the typical packet sequence for closing a TCP session? |
b. FIN, ACK, FIN ACK, ACK |
What type of attack does a remote-access Trojan attempt to perpetrate? |
a. back door |
Which element of an ICMP header would indicate that the packet is an ICMP echo request message. |
d. Type |
Which of the following correctly represents the port used by FTP control traffic and FTP file transfer traffic respectively? |
a. 21, 20 |
Which of the following is an accurate set of characteristics you would find in an attack signature? |
b. IP address, TCP flags, port numbers |
Which of the following is an element of the TCP header that can indicate that a connection has been established? |
a. Flags |
Which of the following is NOT a category of suspicious TCP/IP packet? |
b. suspicious CRC value |
Which of the following is NOT among the items of information that a CVE reference reports? |
a. attack signature |
Which of the following is the description of a land attack? |
a. source and destination IP address/port are the same |
Which TCP flag can be the default response to a probe on a closed port? |
c. RST |
Which type of scan has the FIN, PSH, and URG flags set? |
d. Xmas scan |
OS Hardening – SEC340 chapter 3
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price