Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

christ please help me with this.

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show False  
🗑
T/F: The term malware is derived from a combination of the words malicious and software.   show
🗑
show False  
🗑
show True  
🗑
show True  
🗑
show True  
🗑
show False  
🗑
T/F: Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.   show
🗑
show True  
🗑
T/F: It is ideal to use the same password for multiple different applications, provided the password is complex enough.   show
🗑
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?   show
🗑
Which of the following statements correctly describes the malware characteristic of polymorphism?   show
🗑
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?   show
🗑
Which of the following statements describes a worm?   show
🗑
If multiple honeypots are connected to form a larger network, what term is used to describe the network?   show
🗑
show man-in-the-middle attack  
🗑
Which of the following scenarios represents a phishing attempt?   show
🗑
show The blue team is charged with the defense of the network.  
🗑
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?   show
🗑
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?   show
🗑
show tailgating  
🗑
In the typical social engineering attack cycle, what occurs at Phase 3?   show
🗑
show principle of least privilege  
🗑
What statement regarding denial-of-service (DoS) attacks is accurate?   show
🗑
show DNS poisoning  
🗑
show It is a port scanning utility that can identify open ports on a host.  
🗑
show A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.  
🗑
What type of door access control is a physical or electronic lock that requires a code in order to open the door?   show
🗑
An RFID label on a box is an example of what type of physical security detection method?   show
🗑
What statement regarding the different versions of the SHA hashing algorithm is accurate?   show
🗑
show sha256sum  
🗑
show Get-FileHash  
🗑
VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?   show
🗑
A variant of BYOD, what does CYOD allow employees or students to do?   show
🗑
show What document addresses the specific concerns related to special access given to administrators and certain support staff?  
🗑
show Your company needs to prevent a new contractor from sharing information with a potential competitor.  
🗑
show every 60 days  
🗑
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?   show
🗑
show distributed reflection denial-of-service attack  
🗑
show True  
🗑
show False  
🗑
T/F: The Spanning Tree Protocol operates at the Network layer of the OSI model.   show
🗑
T/F: The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.   show
🗑
T/F: User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.   show
🗑
T/F: Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.   show
🗑
show True  
🗑
show False  
🗑
T/F: The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.   show
🗑
show True  
🗑
show Squid  
🗑
show The operating system used by the source or destination device.  
🗑
In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?   show
🗑
show content-filtering firewall  
🗑
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?   show
🗑
show It is a system used to evaluate data from security devices and generate alerts.  
🗑
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?   show
🗑
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?   show
🗑
show Shortest Path Bridging (SPB)  
🗑
show mac-limit  
🗑
Enforcing a virtual security perimeter using a client's geographic location is known by what term?   show
🗑
show It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.  
🗑
Which legacy authentication protocol requires mutual authentication?   show
🗑
show RADIUS  
🗑
show Protected EAP (PEAP)  
🗑
What IEEE standard includes an encryption key generation and management scheme known as TKIP?   show
🗑
What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?   show
🗑
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?   show
🗑
What aspect of AAA is responsible for determining what a user can and cannot do with network resources?   show
🗑
show RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.  
🗑
show Rivest Cipher 4 (RC4)  
🗑
show It used a shared encryption key for all clients, and the key might never change.  
🗑
In Open System Authentication, how does authentication occur?   show
🗑
show gpedit.msc  
🗑
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?   show
🗑
Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?   show
🗑
In regards to the use of local authentication, what statement is accurate?   show
🗑
What scenario might be ideal for the use of root guard in configuring a switch?   show
🗑
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?   show
🗑
show A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: TheGoldenCPU
Popular Computers sets