Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chap 9 and 10 Quiz

christ please help me with this.

QuestionAnswer
T/F: Different types of organizations have similar levels of network security risks. False
T/F: The term malware is derived from a combination of the words malicious and software. True
T/F: A hacker, in the original sense of the word, is someone with technical skill and malicious intent. False
T/F: The day after Patch Tuesday is informally dubbed Exploit Wednesday. True
T/F: A drop ceiling could be used by an intruder to gain access to a secured room. True
T/F: Over a long-distance connection, using SSH keys is more secure than using passwords. True
T/F: The original version of the Secure Hash Algorithm was developed by MIT. False
T/F: Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection. True
T/F: Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered. True
T/F: It is ideal to use the same password for multiple different applications, provided the password is complex enough. False
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes? metasploit
Which of the following statements correctly describes the malware characteristic of polymorphism? Polymorphic malware can change its characteristics every time it is transferred to a new system.
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware? logic bomb
Which of the following statements describes a worm? A program that runs independently of other software and travels between computers and across networks.
If multiple honeypots are connected to form a larger network, what term is used to describe the network? honeynet
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack? man-in-the-middle attack
Which of the following scenarios represents a phishing attempt? An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
In a red team-blue team exercise, what is the purpose of the blue team? The blue team is charged with the defense of the network.
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers? Nessus
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place? quid pro quo
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this? tailgating
In the typical social engineering attack cycle, what occurs at Phase 3? The attacker exploits an action undertaken by the victim in order to gain access.
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term? principle of least privilege
What statement regarding denial-of-service (DoS) attacks is accurate? A denial-of-service attack prevents legitimate users from accessing normal network resources.
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages? DNS poisoning
What is the Nmap utility used for? It is a port scanning utility that can identify open ports on a host.
How is a posture assessment performed on an organization? A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
What type of door access control is a physical or electronic lock that requires a code in order to open the door? cipher lock
An RFID label on a box is an example of what type of physical security detection method? asset tracking tagging
What statement regarding the different versions of the SHA hashing algorithm is accurate? SHA-2 and SHA-3 both support the same hash lengths.
On a Linux based system, what command can you use to create a hash of a file using SHA-256? sha256sum
Which command can be used on a Windows system to create a hash of a file? Get-FileHash
VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software? mobile device management software
A variant of BYOD, what does CYOD allow employees or students to do? They can choose a device from a limited number of options.
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found? What document addresses the specific concerns related to special access given to administrators and certain support staff?
Which of the following scenarios would necessitate the use of a non-disclosure agreement? Your company needs to prevent a new contractor from sharing information with a potential competitor.
How often should you require users to change their passwords? every 60 days
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS? deauthentication attack
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target? distributed reflection denial-of-service attack
T/F: Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. True
T/F: A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection. False
T/F: The Spanning Tree Protocol operates at the Network layer of the OSI model. False
T/F: The storm-control command is a type of flood guard that is available on most major network switch vendor platforms. True
T/F: User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders. True
T/F: Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options. False
T/F: By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos. True
T/F: When utilizing Kerberos, an access granting ticket is the same as a key. False
T/F: The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop. True
T/F: The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. True
Which of the following is an example of proxy server software? Squid
What is NOT a variable that an network access control list can filter traffic with? The operating system used by the source or destination device.
In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value? 255.255.255.255
What kind of firewall can block designated types of traffic based on application data contained within packets? content-filtering firewall
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall? iptables
What is a SIEM (Security Information and Event Management) system utilized for? It is a system used to evaluate data from security devices and generate alerts.
When using Spanning Tree Protocol, what is the first step in selecting paths through a network? STP must first select the root bridge, or master bridge.
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs? BPDU guard
Which protocol designed to replace STP operates at Layer 3 of the OSI model? Shortest Path Bridging (SPB)
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use? mac-limit
Enforcing a virtual security perimeter using a client's geographic location is known by what term? geofencing
When using Kerberos, what is the purpose of a ticket? It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
Which legacy authentication protocol requires mutual authentication? Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer? RADIUS
Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel? Protected EAP (PEAP)
What IEEE standard includes an encryption key generation and management scheme known as TKIP? 802.11i
What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds? Rapid Spanning Tree Protocol (RSTP)
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished? Use the switchport port-security command to enable MAC filtering.
What aspect of AAA is responsible for determining what a user can and cannot do with network resources? authorization
What statement regarding role-based access control is accurate? RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.
Which encryption standard was originally utilized with WPA's TKIP? Rivest Cipher 4 (RC4)
The Wired Equivalent Privacy standard had what significant disadvantage? It used a shared encryption key for all clients, and the key might never change.
In Open System Authentication, how does authentication occur? The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
The Group Policy utility can be opened by typing what name into a Run box? gpedit.msc
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge? Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port? port mirroring
In regards to the use of local authentication, what statement is accurate? Local authentication is network and server failure tolerant.
What scenario might be ideal for the use of root guard in configuring a switch? You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change? file integrity monitoring (FIM)
What statement correctly describes a stateless firewall? A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
Created by: TheGoldenCPU
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards