Chapter 18 Network Operations

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/73

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:49 PM on 9/13/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

74 Terms

1
New cards

What does the CIA model in network security stand for?
A) Confidentiality, Integrity, Availability
B) Control, Investigation, Access
C) Compliance, Integrity, Authorization
D) Confidentiality, Inspection, Authorization

A — Confidentiality, Integrity, Availability

2
New cards

Which method helps ensure confidentiality in a network?
A) Encryption and principle of least privilege
B) Firmware updates
C) Incremental backups
D) Snapshots

A — Encryption and principle of least privilege

3
New cards

What is meant by integrity in the CIA model?
A) Data must remain consistent from source to destination
B) Only authorized users can view files
C) Data is backed up offsite
D) Devices are physically secured

A — Data must remain consistent from source to destination

4
New cards

What does availability mean in network security?
A) Authorized users can access data when needed
B) All users can see all files
C) Data is stored in multiple formats
D) Firmware is always updated

A — Authorized users can access data when needed

5
New cards

What is the difference between a threat, a vulnerability, and an exploit?
A) Threat is a potential danger, vulnerability is a weakness, exploit takes advantage of the vulnerability
B) Threat is a hacker, vulnerability is software, exploit is hardware
C) Threat is a backup failure, vulnerability is a misconfiguration, exploit is a firewall rule
D) Threat is internal, vulnerability is external, exploit is always a virus

A — Threat is a potential danger, vulnerability is a weakness, exploit takes advantage of the vulnerability

6
New cards

Which of the following is an example of an internal threat?
A) Disgruntled employee with access to sensitive data
B) Hacker accessing the network remotely
C) Malware infection from an email
D) Default passwords on routers

A — Disgruntled employee with access to sensitive data

7
New cards

Which of the following is a vulnerability in a network?
A) Outdated firmware
B) Hackers trying to gain access
C) Security cameras at the entrance
D) Firewall blocking all ports

A — Outdated firmware

8
New cards

Which of the following is an example of an exploit?
A) Spoofing a remote machine to install a backdoor
B) Leaving a firewall port open unintentionally
C) Having an outdated router firmware
D) Employee discussing passwords in the office

A — Spoofing a remote machine to install a backdoor

9
New cards

What is the primary concept of defense in depth in cybersecurity?
A) Using a single strong firewall to protect all assets
B) Implementing multiple layers of security measures to protect systems
C) Relying solely on antivirus software for protection
D) Encrypting only critical files on the network

B — Implementing multiple layers of security measures to protect systems

10
New cards

Which layer in the defense in depth model is considered the first line of defense?
A) Host/Endpoint
B) Network
C) Perimeter
D) Application

C — Perimeter

11
New cards

What is the purpose of a honeypot in perimeter security?
A) To block all network traffic
B) To lure attackers and identify vulnerabilities
C) To store backup data
D) To encrypt data on the network

B — To lure attackers and identify vulnerabilities

12
New cards

What security measures are commonly applied at the network layer?
A) Malware prevention and patch management
B) Network segmentation, VLANs, access control, and guest isolation
C) Application testing in a virtual machine
D) Data separation and principle of least privilege

B — Network segmentation, VLANs, access control, and guest isolation

13
New cards

Which layer focuses on protecting hosts and endpoints?
A) Data layer
B) Application layer
C) Host/Endpoint layer
D) Perimeter layer

C — Host/Endpoint layer

14
New cards

What is the principle of separation of duties in the context of data security?
A) Allowing users full administrative rights over systems
B) Ensuring no single user has enough rights to compromise a system
C) Using the same person for software installation and removal
D) Encrypting data only during transmission

B — Ensuring no single user has enough rights to compromise a system

15
New cards

What is a common sign that there might be a DHCP issue on a network?
A) The network printer stops printing
B) Inconsistent internet speeds, slowdowns, or inability to reach other hosts
C) The Wi-Fi signal is too strong
D) The server reboots automatically

B — Inconsistent internet speeds, slowdowns, or inability to reach other hosts

16
New cards

What indicates that an IP address is outside the expected network range?
A) Its subnet mask is 255.0.0.0
B) The IP address does not match the network ID of the subnet
C) The gateway IP is 192.168.0.1
D) The DNS server responds slowly

B — The IP address does not match the network ID of the subnet

17
New cards

What is a rogue DHCP server?
A) A DHCP server configured to assign static IP addresses
B) An unauthorized device providing IP addresses to network hosts
C) A backup DHCP server for redundancy
D) A DHCP server that only works with wireless networks

B — An unauthorized device providing IP addresses to network hosts

18
New cards

Why is a rogue DHCP server particularly dangerous in wireless networks?
A) Wireless networks do not use DHCP
B) Hosts may receive IP information from the rogue device first
C) Wireless networks have built-in encryption
D) Rogue DHCP servers cannot connect to wireless networks

B — Hosts may receive IP information from the rogue device first

19
New cards

What actions should network administrators take to prevent rogue DHCP issues?
A) Assign random IP addresses to all devices
B) Know their network ID, know the DHCP server IP, and disable unused wall ports
C) Disconnect all wireless access points
D) Block all incoming email

B — Know their network ID, know the DHCP server IP, and disable unused wall ports

20
New cards

What types of attacks can a rogue DHCP server enable?
A) Man-in-the-middle attacks, packet sniffing, and reconnaissance attacks
B) SQL injection and cross-site scripting
C) Physical theft of servers
D) Password brute force attacks

A — Man-in-the-middle attacks, packet sniffing, and reconnaissance attacks

21
New cards

What is the main goal of a denial of service (DoS) attack?
A) To steal passwords from a server
B) To deny access to a service by overwhelming it with requests
C) To encrypt data on the server
D) To physically damage the server

B — To deny access to a service by overwhelming it with requests

22
New cards

Which of the following is an example of a volumetric DoS attack?
A) Slowloris attack
B) SYN flood attack
C) Ping flood or UDP flood
D) Command and control malware

C — Ping flood or UDP flood

23
New cards

What distinguishes a protocol-based DoS attack from a volumetric attack?
A) It targets the network cable
B) It exploits weaknesses in a protocol, such as TCP/IP, to overwhelm the server
C) It sends a large volume of valid requests
D) It encrypts server communications

B — It exploits weaknesses in a protocol, such as TCP/IP, to overwhelm the server

24
New cards

What is a Slowloris attack an example of?
A) A volumetric attack
B) A protocol attack
C) An application-layer DoS attack
D) A malware infection

C — An application-layer DoS attack

25
New cards

How does a distributed denial of service (DDoS) attack differ from a regular DoS attack?
A) DDoS only targets wireless networks
B) DDoS uses multiple computers (zombies) controlled by a single system to attack a target
C) DDoS is slower than a DoS attack
D) DDoS encrypts the server before attacking

B — DDoS uses multiple computers (zombies) controlled by a single system to attack a target

26
New cards

What is the purpose of a command and control (CNC) server in a network attack?
A) To scan for vulnerable ports on the network
B) To control infected computers (zombies) and execute malicious actions such as DDoS or data theft
C) To prevent malware infections
D) To provide backup for critical network data

B — To control infected computers (zombies) and execute malicious actions such as DDoS or data theft

27
New cards

What best describes a man-in-the-middle (MITM) attack?
A) Two systems directly communicating without interference
B) A third party inserting itself between two communicating systems to intercept or manipulate the conversation
C) Encrypting a communication channel to prevent eavesdropping
D) Physically stealing a server from a data center

B — A third party inserting itself between two communicating systems to intercept or manipulate the conversation

28
New cards

Which wireless technique makes it easy for an attacker to perform MITM by capturing packets?
A) Setting a router to bridge mode
B) Using a wireless card in promiscuous/monitor mode to sniff unencrypted 802.11 traffic
C) Increasing the Wi-Fi transmit power
D) Enabling MAC address filtering on the AP

B — Using a wireless card in promiscuous/monitor mode to sniff unencrypted 802.11 traffic

29
New cards

In a wired network, what method is commonly used to position an attacker between two hosts?
A) Replacing the switch with a hub
B) Spoofing (e.g., MAC/IP/DNS) such as ARP poisoning to impersonate another host or gateway
C) Moving the devices to a different VLAN
D) Enabling DHCP snooping on the router

B — Spoofing (e.g., MAC/IP/DNS) such as ARP poisoning to impersonate another host or gateway

30
New cards

What capability makes Ettercap useful for MITM attacks?
A) It automatically patches vulnerable hosts
B) It combines poisoning/spoofing with built-in sniffing and can extract credentials from captured traffic
C) It encrypts all traffic to protect users
D) It only scans for open ports without capturing traffic

B — It combines poisoning/spoofing with built-in sniffing and can extract credentials from captured traffic

31
New cards

What is a replay attack in the context of MITM?
A) Capturing valid authentication data (e.g., username/hash) and replaying it later to authenticate as that user
B) Replaying audio recorded from a VoIP call to confuse users
C) Re-transmitting DNS responses to speed up resolution
D) Rebooting a server repeatedly to cause downtime

A — Capturing valid authentication data (e.g., username/hash) and replaying it later to authenticate as that user

32
New cards

What is session hijacking and which tool demonstrated it on unencrypted web sessions?
A) Forcing a system to change its session timeout; demonstrated by Wireshark
B) Injecting into or taking over an active session to impersonate a user; demonstrated by Firesheep capturing unencrypted web sessions on wireless
C) Rotating session keys frequently to enhance security; demonstrated by Ettercap
D) Blocking all session cookies to prevent login; demonstrated by Nmap

B — Injecting into or taking over an active session to impersonate a user; demonstrated by Firesheep capturing unencrypted web sessions on wireless

33
New cards

What is VLAN hopping?
A) Using VLANs to increase network speed
B) Bypassing Layer 2 VLAN restrictions to access traffic on other VLANs
C) Physically connecting two switches
D) Encrypting VLAN traffic to prevent interception

B — Bypassing Layer 2 VLAN restrictions to access traffic on other VLANs

34
New cards

What are the two main types of VLAN hopping attacks?
A) MAC flooding and IP spoofing
B) VLAN spoofing and double tagging
C) ARP poisoning and DHCP starvation
D) Trunk negotiation and port scanning

B — VLAN spoofing and double tagging

35
New cards

How does VLAN spoofing work?
A) By injecting multiple IP addresses into a subnet
B) By tricking a legitimate switch into forming a trunk link using DTP
C) By encrypting VLAN traffic
D) By isolating ports within a VLAN

B — By tricking a legitimate switch into forming a trunk link using DTP

36
New cards

In a double tagging VLAN hopping attack, why is the native VLAN important?
A) The attacker must be on the native VLAN to have the outer tag stripped, allowing the inner tag to reach the target VLAN
B) The native VLAN encrypts the inner VLAN tag
C) Native VLANs prevent VLAN hopping automatically
D) Native VLANs cannot be used for any communication

A — The attacker must be on the native VLAN to have the outer tag stripped, allowing the inner tag to reach the target VLAN

37
New cards

Which configuration best protects against VLAN hopping attacks?
A) Use dynamic trunking for all ports
B) Manually configure trunk ports and use a dedicated native VLAN only for maintenance
C) Assign all ports to VLAN 1
D) Enable DHCP on all VLANs

B — Manually configure trunk ports and use a dedicated native VLAN only for maintenance

38
New cards

What is the purpose of private VLANs (port isolation)?
A) To allow only isolated ports to communicate with each other
B) To control communication within a VLAN by designating community and isolated ports
C) To merge multiple VLANs into one network
D) To automatically assign IP addresses to VLANs

B — To control communication within a VLAN by designating community and isolated ports

39
New cards

What is IT asset disposal (ITAD)?
A) Selling old equipment to employees
B) Properly retiring and securely disposing of outdated IT equipment
C) Donating old devices without documentation
D) Storing old devices indefinitely

B — Properly retiring and securely disposing of outdated IT equipment

40
New cards

Card 2
Why is maintaining an audit trail important during IT asset disposal?
A) To track internet usage
B) To ensure devices are relocated quickly
C) To confirm that information on devices is not compromised and document the disposal process
D) To reduce energy consumption

C — To confirm that information on devices is not compromised and document the disposal process

41
New cards

Which method is considered compliant for securely wiping hard drives?
A) Single quick format
B) Using DOS UNDELETE
C) Software following DOD 5220.22-M standards with at least three passes
D) Turning the drive off and on

C — Software following DOD 5220.22-M standards with at least three passes

42
New cards

What is the purpose of using asset tags in ITAD?
A) To decorate devices
B) To track and log devices in an asset management system for proper disposal and security
C) To increase resale value
D) To speed up network performance

B — To track and log devices in an asset management system for proper disposal and security

43
New cards

What is software patch management?
A) Installing new software only when a device is replaced
B) Keeping software and firmware up to date by managing and applying patches and fixes
C) Deleting old files to free storage
D) Outsourcing all software updates

B — Keeping software and firmware up to date by managing and applying patches and fixes

44
New cards

What does decommissioning of IT systems involve?
A) Simply shutting down equipment
B) Properly retiring, disposing, or phasing out hardware, software, and infrastructure with documentation and verification
C) Selling old systems online
D) Leaving devices in storage for future use

B — Properly retiring, disposing, or phasing out hardware, software, and infrastructure with documentation and verification

45
New cards

Which of the following is NOT a type of system decommissioning?
A) Partial decommissioning
B) Full decommissioning
C) Network acceleration decommissioning
D) Application decommissioning

C — Network acceleration decommissioning

46
New cards

What is the defining characteristic of a computer virus?
A) It only displays ads on your screen
B) It attaches itself to files or programs and can propagate to other files, causing damage
C) It encrypts your files for ransom
D) It provides remote access to a hacker

B — It attaches itself to files or programs and can propagate to other files, causing damage

47
New cards

What distinguishes adware from other types of malware?
A) It hides and records keystrokes
B) It appears to be innocent but is actually malicious
C) It floods your screen with ads and is usually more annoying than dangerous
D) It encrypts files until a ransom is paid

C — It floods your screen with ads and is usually more annoying than dangerous

48
New cards

How does spyware commonly collect sensitive information?
A) By encrypting files
B) By tracking user activity and logging keystrokes via software or hardware keyloggers
C) By displaying pop-up ads
D) By installing fake antivirus programs

B — By tracking user activity and logging keystrokes via software or hardware keyloggers

49
New cards

What is a Trojan, and how does it typically operate?
A) A program that encrypts files immediately
B) A malicious program that appears innocent but executes harmful actions when activated locally
C) Software that displays ads
D) A type of hardware keylogger

B — A malicious program that appears innocent but executes harmful actions when activated locally

50
New cards

What is the difference between a regular Trojan and a Remote Access Trojan (RAT)?
A) A Trojan encrypts files, while a RAT shows ads
B) A Trojan executes locally, while a RAT allows remote activation and control
C) A Trojan is harmless, while a RAT is always dangerous
D) There is no difference

B — A Trojan executes locally, while a RAT allows remote activation and control

51
New cards

What triggers a logic bomb?
A) When a user visits a website
B) When specific conditions or events occur, such as disabling an account
C) When antivirus software is installed
D) When hardware is removed

B — When specific conditions or events occur, such as disabling an account

52
New cards

What is the main purpose of ransomware or crypto malware?
A) To spy on keystrokes
B) To flood the screen with ads
C) To lock or encrypt files and demand payment for access
D) To provide remote access for maintenance

C — To lock or encrypt files and demand payment for access

53
New cards

How are rootkits and backdoors typically used maliciously?
A) Rootkits encrypt files; backdoors display ads
B) Rootkits gain unauthorized privileges; backdoors provide hidden access points, often used by attackers
C) Both are harmless programs used for diagnostics
D) Rootkits delete files; backdoors steal passwords

B — Rootkits gain unauthorized privileges; backdoors provide hidden access points, often used by attackers

54
New cards

What are key defenses against malware?
A) Keeping antivirus software updated and educating users to avoid suspicious activity
B) Only using ad blockers
C) Reformatting the hard drive monthly
D) Disabling firewalls

A — Keeping antivirus software updated and educating users to avoid suspicious activity

55
New cards

What is dumpster diving in the context of social engineering?
A) Searching trash or discarded items for sensitive company information
B) Fishing in rivers for lost documents
C) Installing malware on a computer
D) Following employees into a secure building

A — Searching trash or discarded items for sensitive company information

56
New cards

What is phishing and how does it differ from whaling?
A) Phishing targets high-profile individuals, whaling targets all employees
B) Phishing uses physical deception, whaling uses email
C) Phishing is sending fraudulent emails to gain personal information; whaling specifically targets high-profile individuals
D) Phishing encrypts files, whaling deletes them

C — Phishing is sending fraudulent emails to gain personal information; whaling specifically targets high-profile individuals

57
New cards

What is shoulder surfing and how can it be mitigated?
A) Observing someone’s screen or keystrokes to obtain sensitive information; mitigated with privacy filters or awareness of surroundings
B) Following someone into a building; mitigated with turnstiles
C) Sending fake emails; mitigated with antivirus software
D) Listening to phone conversations; mitigated with call encryption

A — Observing someone’s screen or keystrokes to obtain sensitive information; mitigated with privacy filters or awareness of surroundings

58
New cards

How does eavesdropping function as a social engineering attack?
A) It installs malware on a network
B) It involves listening to conversations to gather sensitive information, often in casual settings like near a water cooler
C) It steals documents from trash bins
D) It requires impersonating a high-profile executive

B — It involves listening to conversations to gather sensitive information, often in casual settings like near a water cooler

59
New cards

What is tailgating (or piggybacking) in social engineering, and how can it be prevented?
A) Following an authorized person into a secure area; prevented by turnstiles or access control vestibules
B) Sending fake emails to executives; prevented by spam filters
C) Watching someone type their password; prevented by privacy screens
D) Stealing documents from the trash; prevented by shredders

A — Following an authorized person into a secure area; prevented by turnstiles or access control vestibules

60
New cards

What is masquerading (or impersonation) in social engineering, and how should it be handled?
A) Pretending to be malware to scare users; handled by antivirus software
B) Pretending to be an authorized person to extract information; handled by forwarding calls to a higher authority or hanging up
C) Following someone into a secure building; handled by turnstiles
D) Listening to private conversations; handled by talking quietly

B — Pretending to be an authorized person to extract information; handled by forwarding calls to a higher authority or hanging up

61
New cards

What is the key to protecting against social engineering attacks?
A) Installing antivirus software
B) Educating and training users to recognize and respond appropriately to suspicious actions or requests
C) Physically locking all computers
D) Using complex passwords only

B — Educating and training users to recognize and respond appropriately to suspicious actions or requests

62
New cards

What is logical security in the context of IT?
A) Physical locks and guards to protect servers
B) Protecting software and data components of a system or network from threats or attacks
C) Installing security cameras in data centers
D) Restricting access to a building

B — Protecting software and data components of a system or network from threats or attacks

63
New cards

B — Protecting software and data components of a system or network from threats or attacks

A — Data at rest, data in transit, data in use

64
New cards

What is “data at rest” and how can it be secured?
A) Data being transmitted across networks; secured with VPNs and TLS
B) Data stored on non-volatile devices; secured by identifying, classifying, encrypting, and training users
C) Data being processed in memory; secured by antivirus software
D) Data deleted from storage; secured by shredding

B — Data stored on non-volatile devices; secured by identifying, classifying, encrypting, and training users

65
New cards

Why is data in transit considered vulnerable, and what are common protections?
A) It’s physically stolen easily; use locked cabinets
B) It can be intercepted or accessed unauthorizedly; use SSL certificates, VPNs, and encryption protocols like TLS, SFTP
C) It is easily corrupted; use checksum validation only
D) It is stored temporarily; use access control lists

B — It can be intercepted or accessed unauthorizedly; use SSL certificates, VPNs, and encryption protocols like TLS, SFTP

66
New cards

What is “data in use” and what is the best way to protect it?
A) Data stored in archives; protect with long-term storage encryption
B) Data present in primary memory or caches while being processed; protect by limiting access to authorized users
C) Data being transmitted; protect with SSL
D) Data deleted from the system; protect with shredding

B — Data present in primary memory or caches while being processed; protect by limiting access to authorized users

67
New cards

How do the CIA triad and AAA model differ in focus?
A) CIA protects users; AAA protects hardware
B) CIA deals with data confidentiality, integrity, and availability; AAA handles authentication, authorization, and accounting of users
C) CIA is physical security; AAA is software security
D) CIA is compliance only; AAA is encryption only

B — CIA deals with data confidentiality, integrity, and availability; AAA handles authentication, authorization, and accounting of users

68
New cards

What is the main purpose of physical security in network protection?
A) Protect software from malware
B) Prevent theft or unauthorized access to devices and infrastructure
C) Encrypt data in transit
D) Monitor employee performance

B — Prevent theft or unauthorized access to devices and infrastructure

69
New cards

Which of the following are examples of detection physical security methods?
A) Badge readers and biometrics
B) Motion detection systems, asset tags, and tamper detection
C) Fences and bollards
D) Safes and cable locks

B — Motion detection systems, asset tags, and tamper detection

70
New cards

What are examples of preventative physical controls?
A) Alarms and log files
B) Fences, gates, mantraps, locks, and biometric access
C) Security cameras only
D) Motion sensors and infrared detectors

B — Fences, gates, mantraps, locks, and biometric access

71
New cards

What are K ratings in physical security?
A) Encryption standards for secure networks
B) Ratings for fences designed to stop vehicles at specific speeds
C) Badge clearance levels for employees
D) Types of motion detectors

B — Ratings for fences designed to stop vehicles at specific speeds

72
New cards

Which physical control is used to prevent shoulder surfing or data visibility on screens?
A) Retinal scanners
B) Screen filters
C) Smart lockers
D) Motion detectors

B — Screen filters

73
New cards

What are detective physical controls and examples?
A) Prevent attacks; fences and gates
B) Detect unauthorized activity; alarms, cameras, motion detectors, log files
C) Stop phishing; antivirus software
D) Control user permissions; biometrics and badge readers

B — Detect unauthorized activity; alarms, cameras, motion detectors, log files

74
New cards

What is a compensating control in physical security?
A) A control that encrypts sensitive files
B) A temporary measure to maintain security when a primary control is unavailable
C) A type of motion detector
D) A firewall to prevent intrusions

B — A temporary measure to maintain security when a primary control is unavailable