Network security

studied byStudied by 1 person
0.0(0)
get a hint
hint

Which controls are looked at as technical controls?

1 / 248

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

249 Terms

1

Which controls are looked at as technical controls?

Firewall and Intrusion Detection System (IDS)

New cards
2

Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate data through a web form?

SQL injection

New cards
3

An end user calls the help desk complaining about a web page not loading the most current data for the page unless the user refreshes the page.

New cards
4

What should the help desk agent have the user do first?

Clear out the cache

New cards
5

When one suspects a device has been affected by malware, what is the first step that should be taken to remediate the device?

Disconnect the device from the network

New cards
6

A good Audit Plan may collect both successful and failed events.

True

New cards
7

Audit events take up computer resources and personnel time, so you should be selective about the events to audit.

True

New cards
8

You should always audit log-on successes.

False

New cards
9

[Spoofing] redirects Internet traffic from one website to an identical-looking site in order to trick you into entering your username and password into their database.

Pharming

New cards
10

What must take place for someone trying to enter a physical area of a building before access control takes place?

Authentication

New cards
11

MAC Filtering is best suited for large wireless networks.

False, Mac Filtering is best suited for small wireless networks.

New cards
12

WEP is the strongest form of encryption for a wireless network.

False, its WAP

New cards
13

WPA/WPA2 can require an authentication server.

True, if using 802.1x mode

New cards
14

One of the layers of defense in the anti-phishing and malware protection strategies developed by Microsoft is ___.

SmartScreen Filter

New cards
15

One ways you can protect your computer from hackers and malicious software is to use ___.

Windows Firewall

New cards
16

What is considered the minimum length of a good password?

Eight characters

New cards
17

While launching a diagnostic software package, you select to RunAs Admin, this action grants the executioner the ___ permissions.

Least restrictive

New cards
18

If you were to launch a diagnostic software package without selecting RunAs Admin, this action grants the executioner the ___ permissions.

Most restrictive

New cards
19

___ allows multiple computers on an internal network to share one public IP address.

Network Address Translation (NAT)

New cards
20

Which type of VPN will often have a user connect through a web browser?

Secure Sockets Layer (SSL)

New cards
21

Which type of VPN connection usually connects two business entities?

Site-to-Site

New cards
22

What email filtering technique uses a list of verified DNS domains to verify that an email is coming from a trusted IP address?

Sender Policy Framework (SPF)

New cards
23

Applications-level firewalls can provide content filtering and virus protection.

True

New cards
24

Application-level firewalls support caching.

True

New cards
25

Application-level firewalls tend to be less resource intensive than that of a traditional firewall.

False

New cards
26

Which of the following are NTFS permissions?

Read, Write, Modify

New cards
27

Which protocols are considered unsecure and should be avoided in a server enviroment?

Password Authentication Protocol (PAP) and Telnet

New cards
28

Which type of DNS record contains an IP address that is then used to look up an associated host or domain name?

Pointer Record (PTR)

New cards
29

IPSec encrypts data packets using AH.

False

New cards
30

IPSec is a set of protocols that protects data transmission between hosts by providing authentication and privacy.

True

New cards
31

IPSec is used to create a secure tunnel between two computing devices.

False

New cards
32

IPSec uses digital signatures to create a chain of authority.

False

New cards
33

Which of the following would be considered to be the strongest password?

j0hn$m1T

New cards
34

Your IT department is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determine that your current malware signature files are not sufficient for removing this nuisance from your systems.

New cards
35

New cards
36

Which type of attack is taking place?

Adware

New cards
37

Your IT department is getting a barrage of calls from users saying that their pop-up blockers are not blocking ads for huge discounts on software. Upon further research, you also determine that your current malware signature files are not sufficient for removing this nuisance from your systems.

New cards
38

New cards
39

Which characteristic of the attack indicates that it is not being eradicated by antimalware programs?

Zero-day

New cards
40

A certificate authority provides keys used in digital certificates for authentication.

True

New cards
41

In a Public Key Infrastructure, the public key encrypts data, and a corresponding key decrypts it.

False

New cards
42

In Digital Signatures, the sender uses a secret key to create a unique electronic number that can be read by anyone possessing the corresponding public key, which verifies that the message is from the sender.

True

New cards
43

Forging a fake sender address within a email message is an example of ___.

Spoofing

New cards
44

Where do most computers obtain a Media Access Control (MAC) address?

Network Interface

New cards
45

The tool used to view audit logs is Event Viewer.

True

New cards
46

You can audit logon failures to warn of hacking attacks.

True

New cards
47

You cannot limit the size of audit logs.

False

New cards
48

Encrypting a document as it travels across a network.

Confidentialilty

New cards
49

Verifying the sender of a document.

Integrity

New cards
50

Ensuring the Sales department can access a document.

Availability

New cards
51

Users have an FC key and wants to access a Public folder in the NTFS volume. File A needs an R key and File B needs a FC key.

New cards
52

Members of the Users group have ___ permission to File A.

Read Only

New cards
53

Users have an FC key and wants to access a Public folder in the NTFS volume. File A needs an R key and File B needs a FC key.

New cards
54

Members of the Users group have ___ permissions to File B.

Full Control

New cards
55

Backs up all files and resets the archive bit.

Full

New cards
56

Backs up all changed files since the last full or incremental backup.

Incremental

New cards
57

Backs up all changed files since the last full backup.

Differential

New cards
58

Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and client machines?

Simple Mail Transfer Protocol (SMTP)

New cards
59

How can wireless network best be set up to allow only specific devices onto the network?

MAC address filtering

New cards
60

A Network Sniffer can easily obtain ___.

Unencrypted passwords

New cards
61

Which Windows app is used to help protect a device against malware?

Windows Defender

New cards
62

Which of the following are advanced permissions in NTFS?

Change Permissions and Take Ownership

New cards
63

BitLocker, when possible, stores the encryption key on computer's ___.

Trusted Platform Module (TPM)

New cards
64

___ is an authentication method that identifies individuals based on physical characteristics such as fingerprints, facial recognition, retina scans, or voice patterns.

Biometrics

New cards
65

A junior administrator asks you what it means to harden a server.

Uninstall unnecessary features and Disable unnecessary services

New cards
66

To best protect servers, which of the following options is considered a best practice on how services are used on servers?

Spread out the services among servers

New cards
67

Malware that steals and encrypts data and demands money for the return of the data is known as what type of malware?

Ransomware

New cards
68

Which three characteristics describes worms?

Typically does not corrupt/modify files, Uses system resources, and is a self-replicating program that copies itself to other computers without user intervention.

New cards
69

Which password policy prohibits reusing the same password?

History policy

New cards
70

Which protocols are used to encrypt emails?

Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extension (S/MIME)

New cards
71

The process of eliminating a risk by choosing not to participate in an action or activity which of the following?

Risk avoidance

New cards
72

A junior administrator notices, when looking at a folder's permissions, gray checkboxes in the Allow column for a group's permissions.

New cards
73

What do the gray checkboxes represent?

The permissions are inherited.

New cards
74

Where are the password policies established for an Active Directory domain?

Group Policy

New cards
75

Where are the password policies established for an Active Directory domain?

New cards
76

Which control is an administrative control?

Acceptable Use Policy (AUP) and Disaster Recovery Plan (DRP)

New cards
77

Which control is an technical control?

Intrusion Prevention System (IPS)

New cards
78

Which type of backup backs up all changed files since the last full backup?

Differential

New cards
79

Regarding private browsing, history is not saved.

True

New cards
80

Regarding private browsing, if in the workplace, the workplace does not know which sites one visited while browsing in private browsing.

False

New cards
81

Regarding private browsing, an internet service provider will not know the sites one visited while private browsing.

False

New cards
82

Security Compliance Manager is an example of a ___.

Tool for desktop, datacenter, and cloud configurations

New cards
83

Which Windows Registry hive stores file extensions for applications?

HKEY_CLASSES_ROOT

New cards
84

Which Windows Registry hive stores current settings on the current user and computer, respectively.

HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE

New cards
85

Which Windows Registry hive stores runtime information.

HKEY_CURRENT_CONFIGURATION

New cards
86

A ___ is a computer used to trap hackers and distract them from real targets when the hackers are trying to attack a network.

Honeypot

New cards
87

BitLocker will use software-based encryption ___ a TPM on a device.

in the absence of

New cards
88

When you monitor the packet traffic, you notice a very high volume of packets being sent from three computers in the HR Department.

New cards
89

The scenario demonstrate is a ___ attack.

Denial of Service

New cards
90

When you monitor the packet traffic, you notice a very high volume of packets being sent from three computers in the HR Department.

New cards
91

You should ___ to avoid this type of attack.

Run antivirus software on all computers

New cards
92

Which type of malware gains administrator-level access of a system and targets items such as the BIOS, hypervisor, and kernal?

Rootkit

New cards
93

Asymmetric encryption uses a single key to perform encryption and decryption.

False

New cards
94

DES is an asymmetric encryption algorithm.

False

New cards
95

RSA is an asymmetric encryption algorithm.

True

New cards
96

___ monitors packet traffic on a network and reports the sender, destination, and type of packet.

A network sniffer

New cards
97

DNSSEC helps prevent pharming and man-in-the-middle attacks.

True

New cards
98

DNSSEC is proprietary to Microsoft Domain Name Servers.

False

New cards
99

DNSSEC uses a digital signature to create a chain of authority.

True

New cards
100

Which Internet technology poses the greatest risk to a user?

ActiveX Controls

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 26493 people
Updated ... ago
4.8 Stars(224)

Explore top flashcards

flashcards Flashcard74 terms
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 17 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard25 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard74 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard38 terms
studied byStudied by 23 people
Updated ... ago
4.3 Stars(3)
flashcards Flashcard84 terms
studied byStudied by 35 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard68 terms
studied byStudied by 89 people
Updated ... ago
5.0 Stars(3)