Network security

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/248

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

249 Terms

1
New cards
Which controls are looked at as technical controls?
Firewall and Intrusion Detection System (IDS)
2
New cards
Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate data through a web form?
SQL injection
3
New cards
An end user calls the help desk complaining about a web page not loading the most current data for the page unless the user refreshes the page.

4
New cards
What should the help desk agent have the user do first?
Clear out the cache
5
New cards
When one suspects a device has been affected by malware, what is the first step that should be taken to remediate the device?
Disconnect the device from the network
6
New cards
A good Audit Plan may collect both successful and failed events.
True
7
New cards
Audit events take up computer resources and personnel time, so you should be selective about the events to audit.
True
8
New cards
You should always audit log-on successes.
False
9
New cards
\[Spoofing] redirects Internet traffic from one website to an identical-looking site in order to trick you into entering your username and password into their database.
Pharming
10
New cards
What must take place for someone trying to enter a physical area of a building before access control takes place?
Authentication
11
New cards
MAC Filtering is best suited for large wireless networks.
False, Mac Filtering is best suited for small wireless networks.
12
New cards
WEP is the strongest form of encryption for a wireless network.
False, its WAP
13
New cards
WPA/WPA2 can require an authentication server.
True, if using 802.1x mode
14
New cards
One of the layers of defense in the anti-phishing and malware protection strategies developed by Microsoft is \___.
SmartScreen Filter
15
New cards
One ways you can protect your computer from hackers and malicious software is to use \___.
Windows Firewall
16
New cards
What is considered the minimum length of a good password?
Eight characters
17
New cards
While launching a diagnostic software package, you select to RunAs Admin, this action grants the executioner the \___ permissions.
Least restrictive
18
New cards
If you were to launch a diagnostic software package without selecting RunAs Admin, this action grants the executioner the \___ permissions.
Most restrictive
19
New cards
\___ allows multiple computers on an internal network to share one public IP address.
Network Address Translation (NAT)
20
New cards
Which type of VPN will often have a user connect through a web browser?
Secure Sockets Layer (SSL)
21
New cards
Which type of VPN connection usually connects two business entities?
Site-to-Site
22
New cards
What email filtering technique uses a list of verified DNS domains to verify that an email is coming from a trusted IP address?
Sender Policy Framework (SPF)
23
New cards
Applications-level firewalls can provide content filtering and virus protection.
True
24
New cards
Application-level firewalls support caching.
True
25
New cards
Application-level firewalls tend to be less resource intensive than that of a traditional firewall.
False
26
New cards
Which of the following are NTFS permissions?
Read, Write, Modify
27
New cards
Which protocols are considered unsecure and should be avoided in a server enviroment?
Password Authentication Protocol (PAP) and Telnet
28
New cards
Which type of DNS record contains an IP address that is then used to look up an associated host or domain name?
Pointer Record (PTR)
29
New cards
IPSec encrypts data packets using AH.
False
30
New cards
IPSec is a set of protocols that protects data transmission between hosts by providing authentication and privacy.
True
31
New cards
IPSec is used to create a secure tunnel between two computing devices.
False
32
New cards
IPSec uses digital signatures to create a chain of authority.
False
33
New cards
Which of the following would be considered to be the strongest password?
j0hn$m1T
34
New cards
Your IT department is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determine that your current malware signature files are not sufficient for removing this nuisance from your systems.

35
New cards


36
New cards
Which type of attack is taking place?
Adware
37
New cards
Your IT department is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determine that your current malware signature files are not sufficient for removing this nuisance from your systems.

38
New cards


39
New cards
Which characteristic of the attack indicates that it is not being eradicated by antimalware programs?
Zero-day
40
New cards
A certificate authority provides keys used in digital certificates for authentication.
True
41
New cards
In a Public Key Infrastructure, the public key encrypts data, and a corresponding key decrypts it.
False
42
New cards
In Digital Signatures, the sender uses a secret key to create a unique electronic number that can be read by anyone possessing the corresponding public key, which verifies that the message is from the sender.
True
43
New cards
Forging a fake sender address within a email message is an example of \___.
Spoofing
44
New cards
Where do most computers obtain a Media Access Control (MAC) address?
Network Interface
45
New cards
The tool used to view audit logs is Event Viewer.
True
46
New cards
You can audit logon failures to warn of hacking attacks.
True
47
New cards
You cannot limit the size of audit logs.
False
48
New cards
Encrypting a document as it travels across a network.
Confidentialilty
49
New cards
Verifying the sender of a document.
Integrity
50
New cards
Ensuring the Sales department can access a document.
Availability
51
New cards
Users have an FC key and wants to access a Public folder in the NTFS volume. File A needs an R key and File B needs a FC key.

52
New cards
Members of the Users group have \___ permission to File A.
Read Only
53
New cards
Users have an FC key and wants to access a Public folder in the NTFS volume. File A needs an R key and File B needs a FC key.

54
New cards
Members of the Users group have \___ permissions to File B.
Full Control
55
New cards
Backs up all files and resets the archive bit.
Full
56
New cards
Backs up all changed files since the last full or incremental backup.
Incremental
57
New cards
Backs up all changed files since the last full backup.
Differential
58
New cards
Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?
Simple Mail Transfer Protocol (SMTP)
59
New cards
How can wireless network best be set up to allow only specific devices onto the network?
MAC address filtering
60
New cards
A Network Sniffer can easily obtain \___.
Unencrypted passwords
61
New cards
Which Windows app is used to help protect a device against malware?
Windows Defender
62
New cards
Which of the following are advanced permissions in NTFS?
Change Permissions and Take Ownership
63
New cards
BitLocker, when possible, stores the encryption key on computer's \___.
Trusted Platform Module (TPM)
64
New cards
\___ is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns.
Biometrics
65
New cards
A junior administrator asks you what it means to harden a server.
Uninstall unnecessary features and Disable unnecessary services
66
New cards
To best protect servers, which of the following options is considered a best practice on how services are used on servers?
Spread out the services among servers
67
New cards
Malware that steals and encrypts data and demands money for the return of the data is known as what type of malware?
Ransomware
68
New cards
Which three characteristics describes worms?
Typically does not corrupt/modify files, Uses system resources, and is a self-replicating program that copies itself to other computers without user intervention.
69
New cards
Which password policy prohibits reusing the same password?
History policy
70
New cards
Which protocols are used to encrypt emails?
Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extension (S/MIME)
71
New cards
The process of eliminating a risk by choosing not to participate in an action or activity which of the following?
Risk avoidance
72
New cards
A junior administrator notices, when looking at a folder's permissions, gray checkboxes in the Allow column for a group's permissions.

73
New cards
What do the gray checkboxes represent?
The permissions are inherited.
74
New cards
Where are the password policies established for an Active Directory domain?
Group Policy
75
New cards
Where are the password policies established for an Active Directory domain?

76
New cards
Which control is an administrative control?
Acceptable Use Policy (AUP) and Disaster Recovery Plan (DRP)
77
New cards
Which control is an technical control?
Intrusion Prevention System (IPS)
78
New cards
Which type of backup backs up all changed files since the last full backup?
Differential
79
New cards
Regarding private browsing, history is not saved.
True
80
New cards
Regarding private browsing, if in the workplace, the workplace does not know which sites one visited while browsing in private browsing.
False
81
New cards
Regarding private browsing, an internet service provider will not know the sites one visited while private browsing.
False
82
New cards
Security Compliance Manager is an example of a \___.
Tool for desktop, datacenter, and cloud configurations
83
New cards
Which Windows Registry hive stores file extensions for applications?
HKEY_CLASSES_ROOT
84
New cards
Which Windows Registry hive stores current settings on the current user and computer, respectively.
HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE
85
New cards
Which Windows Registry hive stores runtime information.
HKEY_CURRENT_CONFIGURATION
86
New cards
A \___ is a computer used to trap hackers and distract them from real targets when the hackers are trying to attack a network.
Honeypot
87
New cards
BitLocker will use software-based encryption \___ a TPM on a device.
in the absence of
88
New cards
When you monitor the packet traffic, you notice a very high volume of packets being sent from three computers in the HR Department.

89
New cards
The scenario demonstrate is a \___ attack.
Denial of Service
90
New cards
When you monitor the packet traffic, you notice a very high volume of packets being sent from three computers in the HR Department.

91
New cards
You should \___ to avoid this type of attack.
Run antivirus software on all computers
92
New cards
Which type of malware gains administrator-level access of a system and targets items such as the BIOS, hypervisor, and kernal?
Rootkit
93
New cards
Asymmetric encryption uses a single key to perform encryption and decryption.
False
94
New cards
DES is an asymmetric encryption algorithm.
False
95
New cards
RSA is an asymmetric encryption algorithm.
True
96
New cards
\___ monitors packet traffic on a network and reports the sender, destination, and type of packet.
A network sniffer
97
New cards
DNSSEC helps prevent pharming and man-in-the-middle attacks.
True
98
New cards
DNSSEC is proprietary to Microsoft Domain Name Servers.
False
99
New cards
DNSSEC uses a digital signature to create a chain of authority.
True
100
New cards
Which Internet technology poses the greatest risk to a user?
ActiveX Controls