click below
click below
Normal Size Small Size show me how
Block 2 Unit 4
| Question | Answer |
|---|---|
| ___ attacks occur when more requests are sent to a machine (host) than it can handle. | DOS |
| ___ attacks allow access to some resources that your machine should not provide to the attacker. | Unauthorized access |
| Executing commands illicitly occurs when a/an ___ person executes commands on a server. | Unknown and untrusted |
| The two types of destructive behavior are ____ and ____. | Data diddling and data destruction |
| The destructive behavior where the attacker changes entries in records is known as ___. | data diddling |
| The destructive behavior where the attacker deletes files is known as ___. | data destruction |
| Securing the mechanisms of the internet include | securing the protocols, improving internet routing and improving management. |
| Which mechanism’s goal for securing the internet ensures the reliability and security of three key protocols? | Secure the protocols |
| Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of-band management? | Improve internet routing |
| What benefit is gained by improving address verification? | Identify the source of DoS attacks |
| Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities? | Reduce and remediate software vulnerabilities |
| The identity management objective that alerts the recipient of unauthorized modification to cyber information is called | Data integrity |
| What goal of identity management protects data from unauthorized review? | Confidentiality |
| What goal of identity management verifies you are who you say you are? | Authentication and ID |
| How does the Air Force meet the goals of identity management? | DoD PKI and CAC |
| Which PKI certificate identifies you to the network? | Identity Certificate |
| Which PKI certificate contains your public key that is used to verify the digital signature on the e-mail messages? | Email Signature Certificate |
| Which PKI certificate contains your public key used to encrypt e-mail? | Email Encryption Certificate |
| How is your private key protected? | By 6-8 digit PIN |
| What is the purpose of a common access card? | Building and security access, as well as access to PKI applications |
| Why is it important to change an (SSID) service set identifier? | Identifies a poorly configured Wi-Fi |
| Why is it important to change administrator passwords and user names on a wireless Web page? | They are simple and well-known to hackers |
| Which wireless network security guidelines supports keying in the MAC address of authorized devices? | MAC Filtering |
| Why is enabling DHCP a bad idea on a wireless network? | Hackers can easily obtain a valid IP address |