Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

christ please help me with this.

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
T/F: Different types of organizations have similar levels of network security risks.   show
🗑
show True  
🗑
T/F: A hacker, in the original sense of the word, is someone with technical skill and malicious intent.   show
🗑
T/F: The day after Patch Tuesday is informally dubbed Exploit Wednesday.   show
🗑
show True  
🗑
show True  
🗑
T/F: The original version of the Secure Hash Algorithm was developed by MIT.   show
🗑
T/F: Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.   show
🗑
T/F: Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.   show
🗑
T/F: It is ideal to use the same password for multiple different applications, provided the password is complex enough.   show
🗑
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?   show
🗑
show Polymorphic malware can change its characteristics every time it is transferred to a new system.  
🗑
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?   show
🗑
show A program that runs independently of other software and travels between computers and across networks.  
🗑
show honeynet  
🗑
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?   show
🗑
Which of the following scenarios represents a phishing attempt?   show
🗑
In a red team-blue team exercise, what is the purpose of the blue team?   show
🗑
show Nessus  
🗑
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?   show
🗑
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?   show
🗑
In the typical social engineering attack cycle, what occurs at Phase 3?   show
🗑
show principle of least privilege  
🗑
show A denial-of-service attack prevents legitimate users from accessing normal network resources.  
🗑
show DNS poisoning  
🗑
show It is a port scanning utility that can identify open ports on a host.  
🗑
show A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.  
🗑
What type of door access control is a physical or electronic lock that requires a code in order to open the door?   show
🗑
An RFID label on a box is an example of what type of physical security detection method?   show
🗑
What statement regarding the different versions of the SHA hashing algorithm is accurate?   show
🗑
show sha256sum  
🗑
show Get-FileHash  
🗑
show mobile device management software  
🗑
A variant of BYOD, what does CYOD allow employees or students to do?   show
🗑
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?   show
🗑
show Your company needs to prevent a new contractor from sharing information with a potential competitor.  
🗑
How often should you require users to change their passwords?   show
🗑
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?   show
🗑
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?   show
🗑
show True  
🗑
T/F: A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.   show
🗑
T/F: The Spanning Tree Protocol operates at the Network layer of the OSI model.   show
🗑
T/F: The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.   show
🗑
show True  
🗑
T/F: Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.   show
🗑
T/F: By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.   show
🗑
T/F: When utilizing Kerberos, an access granting ticket is the same as a key.   show
🗑
T/F: The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.   show
🗑
show True  
🗑
show Squid  
🗑
show The operating system used by the source or destination device.  
🗑
show 255.255.255.255  
🗑
What kind of firewall can block designated types of traffic based on application data contained within packets?   show
🗑
show iptables  
🗑
show It is a system used to evaluate data from security devices and generate alerts.  
🗑
show STP must first select the root bridge, or master bridge.  
🗑
show BPDU guard  
🗑
Which protocol designed to replace STP operates at Layer 3 of the OSI model?   show
🗑
You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?   show
🗑
show geofencing  
🗑
show It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.  
🗑
Which legacy authentication protocol requires mutual authentication?   show
🗑
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?   show
🗑
show Protected EAP (PEAP)  
🗑
show 802.11i  
🗑
show Rapid Spanning Tree Protocol (RSTP)  
🗑
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?   show
🗑
What aspect of AAA is responsible for determining what a user can and cannot do with network resources?   show
🗑
What statement regarding role-based access control is accurate?   show
🗑
Which encryption standard was originally utilized with WPA's TKIP?   show
🗑
show It used a shared encryption key for all clients, and the key might never change.  
🗑
show The client "authenticates" using only the SSID name. In other words, no real authentication occurs.  
🗑
show gpedit.msc  
🗑
show Only one root port, which is the bridge's port that is closest to the root bridge, can forward.  
🗑
show port mirroring  
🗑
show Local authentication is network and server failure tolerant.  
🗑
show You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.  
🗑
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?   show
🗑
show A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: TheGoldenCPU
Popular Computers sets