CYBR 201: Exam 2 Review

5.0(1)
studied byStudied by 5 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/178

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

179 Terms

1
New cards

A(n) _______________ is a group of two or more devices linked together to share data.

Network

2
New cards

A packet in an IP network is sometimes called a(n) _______________.

Datagram

3
New cards

Moving packets from source to destination across multiple networks is called ____________.

Routing

4
New cards

The _______________ is the hardware address used to uniquely identify each device on a network.

MAC Address (Media Access Control Address)

5
New cards

A(n) _______________ tells you what portion of a 32-bit IP address is being used as the network ID and what portion is being used as the host ID.

Subnet mask

6
New cards

The shape or arrangement of a network, such as bus, star, ring, or mixed, is known as the _______________ of the network.

Topology

7
New cards

A small, typically local network covering a relatively small area such as a single floor of an office building is called a(n) _______________.

LAN

8
New cards

A(n) _______________ is an agreed-upon format for exchanging information between systems.

Protocol

9
New cards

The packet exchange sequence (SYN, SYN/ACK, ACK) that initiates a TCP connection is called the _______________.

Three-way Handshake

10
New cards

_______________ is the protocol that allows the use of private, internal IP addresses for internal traffic and public IP addresses for external traffic.

Network Address Translation (NAT)

11
New cards

What is Layer 1 of the OSI model called?

A. The physical layer

B. The network layer

C. The initial layer

D. The presentation layer

A) Physical Layer

12
New cards

What is the process that dynamically assigns an IP address to a network device called?

A. NAT

B. DNS

C. DHCP

D. Routing

C) DHCP

13
New cards

What is the three-way handshake sequence used to initiate TCP connections?

A. ACK, SYN/ACK, ACK

B. SYN, SYN/ACK, ACK

C. SYN, SYN, ACK/ACK

D. ACK, SYN/ACK, SYN

B) SYN, SYN/ACK, ACK

14
New cards

Which of the following is a control and information protocol used by network devices to determine such things as a remote network’s availability and the length of time required to reach a remote network?

A. UDP

B. NAT

C. TCP

D. ICMP

D) ICMP

15
New cards

What is the name of the protocol that translates names into IP addresses?

A. TCP

B. DNS

C. ICMP

D. DHCP

B) DNS

16
New cards

Dividing a network address space into smaller, separate networks is called what?

A. Translating

B. Network configuration

C. Subnetting

D. Address translation

C) Subnetting

17
New cards

Which protocol translates private (nonroutable) IP addresses into public (routable) IP addresses?

A. NAT

B. DHCP

C. DNS

D. ICMP

A) NAT

18
New cards

Which of the following statements best describes the User Datagram Protocol (UDP)?

A. It provides excellent error-checking algorithms.

B. It is a connectionless protocol.

C. It guarantees delivery of packets.

D. It requires a permanent connection between the source and destination.

B) It is a connectionless protocol

19
New cards

9. Which of the following statements best describes the Transmission Control Protocol (TCP)?

A. It is connectionless.

B. It provides no error checking.

C. It allows for packets to be processed in the order they were sent.

D. It has no overhead.

C) It allows for packets to be processed in the order they were sent

20
New cards

10. Which of the following would be a valid MAC address?

A. 00:07:e9

B. 00:07:e9:7c:c8

C. 00:07:e9:7c:c8:aa

D. 00:07:e9:7c:c8:aa:ba

C) 00:07:e9:7c:c8:aa [6 groups of hex]

21
New cards

A(n) _______________ routes packets based on IP addresses.

Router

22
New cards

Technology used to verify endpoint compliance with security rules before connecting to a network is called _______________.

Network Access Control (NAC)

23
New cards

To connect a computer to a network, you use a(n) _______________.

NIC (Network Interface Card)

24
New cards

A(n) _______________ or _______________ distributes traffic based on MAC addresses.

Bridge or Switch

25
New cards

_______________ is quarantining or isolation of a system from its surroundings.

Sandboxing

26
New cards

_______________ is a name for the typical computer a user uses on a network.

Workstation

27
New cards

A(n) _______________ repeats all data traffic across all connected ports.

Hub

28
New cards

Cat 6 is an example of _______________ cable.

UTP

29
New cards

Basic packet filtering occurs at the ____________.

Firewall

30
New cards

A(n) _______________ is an extension of the telephone service into a firm’s telecommunications network.

Private Branch Exchange (PBX)

31
New cards

Switches operate at which layer of the OSI model?

A. Physical layer

B. Transport layer

C. Data link layer

D. Application layer

C) Data link layer

32
New cards

UTP cables are terminated for Ethernet using what type of connector?

A. A BNC plug

B. An Ethernet connector

C. A standard phone jack connector

D. An RJ-45 connector

D) An RJ-45 Connector

33
New cards

Coaxial cable carries how many physical channels?

A. Two

B. Four

C. One

D. None of the above

C) One

34
New cards

Network access control is associated with which of the following?

A. NAP

B. IPSec

C. IPv6

D. NAT

D) NAT

35
New cards

What is the purpose of twisting the wires in twisted-pair circuits?

A. To increase speed

B. To increase bandwidth

C. To reduce crosstalk

D. To allow easier tracing

C) To reduce crosstalk

36
New cards

What is one of the challenges when managing a large number of VMs in the enterprise?

A. VM permissions

B. VM sprawl

C. VM size

D. VM locking

B) VM Sprawl

37
New cards

SNMP is a protocol used for which of the following functions?

A. Secure e-mail

B. Secure encryption of network packets

C. Remote access to user workstations

D. Remote access to the network infrastructure

D) Remote access to the network infrastructure

38
New cards

Firewalls can use which of the following in their operation?

A. Stateful packet inspection

B. Port blocking to deny specific services

C. NAT to hide internal IP addresses

D. All of the above

D) All of the above

39
New cards

SMTP is a protocol used for which of the following functions?

A. E-mail

B. Secure encryption of network packets

C. Remote access to user workstations

D. None of the above

A) E-mail

40
New cards

USB-based flash memory is characterized by which of the following?

A. High cost

B. Low capacity

C. Slow access

D. None of the above

D) None of the above

41
New cards

_______________ is an authentication model designed around the concept of using tickets for accessing objects.

Kerberos

42
New cards

_______________ is designed around the type of tasks people perform.

RBAC (Roll Based Access Control)

43
New cards

_______________ refers to the condition where trust is extended to another domain that is already trusted.

Transitive Trust

44
New cards

_______________ describes a system where every resource has access rules set for it all of the time.

Mandatory Access Control (MAC, not to be confused with MAC Addresses)

45
New cards

_______________ is an authentication process where the user can enter their user ID (or username) and password and then be able to move from application to application or resource to resource without having to supply further authentication information.

Single Sign On (SSO)

46
New cards

If your fingerprints fail to let you into a system when they should, this is called a(n) _______________.

False Negative

47
New cards

When both the client and the server authenticate each other, this is called _______________.

Mutual Authentication

48
New cards

_______________ is an access control method that would allow you to control access to records only when someone is scheduled to work.

ABAC (Attribute Access Control)

49
New cards

Authentication that is sent in plaintext with only Base64 encoding is an example of ______________.

Basic authentication

50
New cards

Authentication can be based on what?

A. Something a user possesses

B. Something a user knows

C. Something measured on a user, such as a fingerprint

D. All of the above

D) All of the above

51
New cards

You’ve spent the last week tweaking a fingerprint-scanning solution for your organization. Despite your best efforts, roughly 1 in 50 attempts will fail even if the user is using the correct finger and their fingerprint is in the system. Your supervisor says 1 in 50 is “good enough” and tells you to move onto the next project. Your supervisor just defined which of the following for your fingerprint-scanning system?

A. False rejection rate

B. False acceptance rate

C. Critical threshold

D. Failure acceptance criteria

A) False rejection rate

52
New cards

A ticket-granting server is an important element in which of the following authentication models?

A. L2TP

B. RADIUS

C. PPP

D. Kerberos

D) Kerberos

53
New cards

What protocol is used for RADIUS?

A. UDP

B. NetBIOS

C. TCP

D. Proprietary

A) UDP

54
New cards

Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) labeled with its sensitivity level?

A. Discretionary access control

B. Resource access control

C. Mandatory access control

D. Media access control

C) Mandatory Access Control

55
New cards

Which of the following algorithms uses a secret key with a current timestamp to generate a one-time password?

A. Hash-based Message Authentication Code

B. Date-hashed Message Authorization Password

C. Time-based One-Time Password

D. Single sign-on

C) Time-based One-Time Password

56
New cards

You have to implement an OpenID solution. What is the typical relationship with existing systems?

A. OpenID is used for authentication, OAuth is used for authorization.

B. OpenID is used for authorization, OAuth is used for authentication.

C. OpenID is not compatible with OAuth.

D. OpenID only works with Kerberos.

A) OpenID is used for authentication, OAuth is used for authorization

57
New cards

Elements of Kerberos include which of the following?

A. Tickets, ticket-granting server, ticket-authorizing agent

B. Ticket-granting ticket, authentication server, ticket

C. Services server, Kerberos realm, ticket authenticators

D. Client-to-server ticket, authentication server ticket, ticket

B) Ticket-granting ticket, authentication server, ticket

58
New cards

To establish a PPTP connection across a firewall, you must do which of the following?

A. Do nothing. PPTP does not need to cross firewalls by design.

B. Do nothing. PPTP traffic is invisible and tunnels past firewalls.

C. Open a UDP port of choice and assign it to PPTP.

D. Open TCP port 1723.

D) Open TCP port 1723

59
New cards

To establish an L2TP connection across a firewall, you must do which of the following?

A. Do nothing. L2TP does not cross firewalls by design.

B. Do nothing. L2TP tunnels past firewalls.

C. Open a UDP port of choice and assign it to L2TP.

D. Open UDP port 1701.

D) Open UDP port 1701

60
New cards

An AP uses _______________ to advertise its existence to potential wireless clients.

Beacon Frames

61
New cards

The _______________ is the part of the RC4 cipher that has a weak implementation in WEP.

Initialization Vector (IV)

62
New cards

Two common mobile device security measures are _______________ and _______________.

Screenlocking and Remote Wiping

63
New cards

To identify a specific AP and network, one would use the _______________.

BSSID

64
New cards

The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the _______________.

SSID

65
New cards

_______________ is a feature that can disclose a user’s position when sharing photos.

Geotagging

66
New cards

802.11i updates the flawed security protocol called _______________.

WEP

67
New cards

The standard for wireless local area networks is called _______________.

IEEE802.11

68
New cards

The type of application used to control security across multiple mobile devices in an enterprise is called _______________.

Mobile Device Management (MDM)

69
New cards

802.11a uses frequencies in the _______________.

5GHz (b, g, and n use 2.4 GHz)

70
New cards

Bluebugging can give an attacker what?

A. All of your contacts

B. The ability to send “shock” photos

C. Total control over a mobile phone

D. A virus

C) Total control over a mobile phone

71
New cards

How does 802.11n improve network speed?

A. Wider bandwidth

B. Higher frequency

C. Multiple-input multiple-output (MIMO)

D. Both A and C

D) Both A and C

72
New cards

802.11ax is also called?

A. Wi-Fi 4

B. Wi-Fi 5

C. Wi-Fi 6

D. 5G

C) Wi-Fi 6

73
New cards

WEP has used an implementation of which of the following encryption algorithms?

A. SHA

B. ElGamal

C. RC4

D. Triple-DES

C) RC4

74
New cards

What element does not belong in a mobile device security policy in an enterprise employing BYOD?

A. Separation of personal and business-related information

B. Remote wiping

C. Passwords and screen locking

D. Mobile device carrier selection

D) Mobile device carrier selection

75
New cards

What is bluejacking?

A. Stealing a person’s mobile phone

B. Sending an unsolicited message via Bluetooth

C. Breaking a WEP key

D. Leaving your Bluetooth in discoverable mode

B) Sending an unsolicited message via Bluetooth

76
New cards

While the SSID provides some measure of authentication, why is it not very effective?

A. It is dictated by the manufacturer of the access point.

B. It is encrypted.

C. It is broadcast in every beacon frame.

D. SSID is not an authentication function.

C) It is broadcast in every beacon frame

77
New cards

802.1X is a protocol for which aspect of Ethernet?

A. Authentication

B. Speed

C. Wireless

D. Cabling

A) Authentication

78
New cards

What is the best way to avoid problems with Bluetooth?

A. Keep personal info off your phone.

B. Keep Bluetooth discoverability off.

C. Buy a new phone often.

D. Encryption.

B) Keep Bluetooth discoverability off

79
New cards

Why is attacking wireless networks so popular?

A. There are more wireless networks than wired.

B. They all run Windows.

C. It’s easy.

D. It’s more difficult and more prestigious than other network attacks.

C) It’s easy

80
New cards

A(n) _______________ is a piece of software or an integrated software/hardware system that can capture and decode network traffic.

Protocol analyzer (Wireshark is an example)

81
New cards

When an IDS generates an alarm on “normal” traffic that is actually not malicious or suspicious, that alarm is called a(n) _______________.

False Positive

82
New cards

An attacker scanning a network full of inviting, seemingly vulnerable targets might actually be scanning a(n) _______________, where the attacker’s every move can be watched and monitored by security administrators.

Honeypot

83
New cards

A(n) _______________ looks at a certain string of characters inside a TCP packet.

Content Based Signature

84
New cards

An IDS that looks for unusual or unexpected behavior is using a(n) _______________.

Anomaly Detection Model

85
New cards

_______________ allows administrators to send all traffic passing through a network switch to a specific port on the switch.

Port Mirroring

86
New cards

Within an IDS, the _______________ examines the collected network traffic and compares it to known patterns of suspicious or malicious activity stored in the signature database.

Analysis Engine

87
New cards

_______________ is a technique whereby a host is queried and identified based on its response to a query.

Banner Grabbing

88
New cards

_______________ is a technique for matching an element against a large set of patterns and using activity as a screening element.

Context Based Signature

89
New cards

_______________ is a new entry in the IDS toolset as a replacement for Snort.

Suricata

90
New cards

What are the two main types of intrusion detection systems?

A. Network based and host based

B. Signature based and event based

C. Active and reactive

D. Intelligent and passive

A) Network based and host based

91
New cards

What are the two main types of IDS signatures?

A. Network based and file based

B. Context based and content based

C. Active and reactive

D. None of the above

B) Context based and Content based

92
New cards

Which of the following describes a passive, host-based IDS?

A. It runs on the local system.

B. It does not interact with the traffic around it.

C. It can look at system event and error logs.

D. All of the above.

D) All of the above

93
New cards

Which of the following is not a capability of network-based IDS?

A. It can detect denial-of-service attacks.

B. It can decrypt and read encrypted traffic.

C. It can decode UDP and TCP packets.

D. It can be tuned to a particular network environment.

B) It can decrypt and read encrypted traffic

94
New cards

An active IDS can do which of the following?

A. Respond to attacks with TCP resets

B. Monitor for malicious activity

C. A and B

D. None of the above

C) A and B

95
New cards

What are honeypots used for?

A. To attract attackers by simulating systems with open network services

B. To monitor network usage by employees

C. To process alarms from other IDSs

D. To attract customers to e-commerce sites

A) To attract attackers by simulating systems with open network services

96
New cards

Connecting to a server and sending a request over a known port in an attempt to identify the version of a service is an example of what?

A. Port sniffing

B. Protocol analysis

C. Banner grabbing

D. TCP reset

C) Banner grabbing

97
New cards

Preventative intrusion detection systems:

A. Are cheaper

B. Are designed to stop malicious activity from occurring

C. Can only monitor activity

D. Were the first type of IDS

B) Are designed to stop malicious activity from occurring

98
New cards

IPS stands for which of the following?

A. Intrusion processing system

B. Intrusion prevention sensor

C. Intrusion prevention system

D. Interactive protection system

C) Intrusion prevention system

99
New cards

What is a protocol analyzer used for?

A. To troubleshoot network problems

B. To collect network traffic statistics

C. To monitor for suspicious traffic

D. All of the above

D) All of the above

100
New cards

_______________ is the process of establishing a system’s security state.

Baselining