Exam 2: Types of Attacks
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
Which is NOT true about a buffer overflow attack?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
A program that self-replicates is,by definition,called a(n)____________.
Free
(Short Answer)
4.7/5
(29)
Correct Answer:
virus
Which of the following activities do security professionals recommend to limit the chances of becoming a target for a Trojan horse?
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
B
Which created a domestic "cyber terrorism" attack against a Unix distributor?
(Multiple Choice)
5.0/5
(27)
Configuring routers to not forward directed broadcast packets can help defend against a ____________ attack.
(Short Answer)
5.0/5
(39)
Which method of defense against a SYN flood involves altering the response timeout?
(Multiple Choice)
4.8/5
(41)
A Distributed Reflection DoS attack takes advantage of the fact that most Internet routers communicate on port ____________.
(Short Answer)
4.9/5
(40)
What do many analysts believe was the reason for the MyDoom virus\worm?
(Multiple Choice)
4.9/5
(31)
Shutting down router and firewall ports 5554 and 9996 will block most damage from which of these?
(Multiple Choice)
4.8/5
(33)
Which attack causes Internet routers to attack the target systems without actually compromising the routers themselves?
(Multiple Choice)
4.8/5
(35)
One of the most common types of attacks via the Internet is:
(Multiple Choice)
4.8/5
(31)
Which presented itself as an e-mail from the system administrator informing the user of a virus infection and gave directions to open an e-mail attachment which would then scan for e-mail addresses and shared folders?
(Multiple Choice)
5.0/5
(33)
The spread of viruses can be minimized by all of the following EXCEPT:
(Multiple Choice)
4.8/5
(30)
A ____________ can help reduce system vulnerability by preventing disclosure of IP addresses much like a firewall.
(Short Answer)
4.7/5
(36)
Which of the following denial of service attacks results from a client's failure to respond to the server's reply to a request for connection?
(Multiple Choice)
4.9/5
(43)
Which copies itself into the Windows directory and creates a registry key to load itself at startup?
(Multiple Choice)
4.8/5
(33)
Which created a buffer overflow attack against a Windows flaw called the DCOM RPC vulnerability?
(Multiple Choice)
5.0/5
(40)
The Distributed Denial of Service attack initiated by the ____________ worm is considered by many to be a clear example of cyber-terrorism.
(Short Answer)
4.9/5
(41)
Showing 1 - 20 of 27
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)