Question | Answer |
Bogus e-mails trying to trick you into revealing information constitute _____ attacks. | Phishing |
_____ is when you separate and either allow or deny access based only on the packet type being sent. | Packet Filtering |
A/an _____ is either hardware or software that protects a network from threats by using a variety of methods. | Firewall |
When your network blocks out traffic based on port number, you are using _____. | Port Filtering |
The Microsoft Windows XP (Service Pack 2 and later) operating system includes a built-in feature called _____ to protect from network threats. | Windows Firewall |
The infamous “smurf attack” is a classic _____. | Denial of Service (DoS) Attack |
Many IT professionals are surprised when they first learn that the majority of network threats are a/an _____. | Internal Threats |
The _____ is when a network administrator has set up a perimeter defense using two routers on the outer edge of your corporate network between your firewall and the Internet. | Demilitarized Zone (DMZ) |
_____ hides your private network’s IP addresses from the Internet. | Network Address Translation (NAT) |
A/an _____ makes copies of itself across hard drives, but not across a network. | Virus |
What aspect of protecting your network involves theft of equipment? | Physical Security |
What items make up the strongest complex passwords? | Lowercase letters, Uppercase letters, Numbers, and Special characters |
What is another name for port filtering? | Port Blocking |
What is the term used to describe when folder permissions flow downward into subfolders? | Inheritance |
How should user accounts be established? | Only given to specified individuals; Allowed access to needed resources |
Where would a DMZ more commonly be found? | On a larger network |
Just after opening a Microsoft Excel spreadsheet, Rowan notices that some of his filenames have changed and that his network connection no longer works. What type of malware has infected his computer? | Macro |
What problem does a rogue access point introduce? | Unauthorized access to a wireless network |
What is the difference between a virus and a worm? | A worm replicates across networks. A virus does not. |
True or False: A DoS uses a zombie while a DDoS uses a botnet to attack a single system. | True |
What is a honey pot? | It acts as a fake network, luring potential hackers away from the actual network. |
What are examples of a software firewall? | Host-based firewalls and ZoneAlarm Pro. |