Exam 12: Securing Tcp/Ip Environments

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following terms means restricting who may view or use certain resources, including access to bandwidth or a computer, as well as access to information?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

Which of the following is a specially "hardened" software service or software/hardware product that erects a barrier to inspect and control traffic flow between networks?

Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
Verified

A

Which type of attack includes SYN Flood, broadcast amplification attacks, and buffer overflow?

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

A

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -the process of examining the "footprints" that an attacker leaves behind

(Short Answer)
4.7/5
(34)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a special-purpose software tool that cycles through all possible TCP and UDP port addresses looking for open ports that then can be probed for access or exploited for vulnerabilities

(Short Answer)
4.9/5
(44)

A(n) ____________________ consists of creating hashed values for all words in a specialized dictionary of terms, then comparing those values to the hashed values in password files.

(Short Answer)
5.0/5
(33)

Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?

(Multiple Choice)
4.9/5
(34)

Proxy server software permits internal network addresses to be "translated" into public network addresses when packets leave inside networks so only public IP addresses are exposed on the public Internet.

(True/False)
4.8/5
(35)

Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?

(Multiple Choice)
4.9/5
(39)

Strictly speaking, VPNs use tunneling protocols; therefore, they need to encrypt tunneled traffic.

(True/False)
4.9/5
(35)

Which of the following is an area that's accessible to both outsiders and insiders, but which establishes a buffer area between what's completely inside and outside a network boundary?

(Multiple Choice)
4.8/5
(33)

Which of the following is unsolicited and unwanted software that takes up stealthy unauthorized and uninvited residence on a computer?

(Multiple Choice)
4.9/5
(31)

Which type of attacks are designed to interrupt or completely disrupt operations of a network device or network communications?

(Multiple Choice)
4.7/5
(33)

Which of the following is an undocumented and illicit point of entry into an operating system or application added by a system's programmers to bypass normal security?

(Multiple Choice)
4.9/5
(33)

Briefly describe IP service implementation vulnerabilities, and insecure IP protocols and services.

(Essay)
4.9/5
(43)

A(n) ____________________ model excludes users from access to resources, by default, and then adds whatever users need access to such resources as exceptions to the general exclusionary rule.

(Short Answer)
4.8/5
(37)

Briefly describe the following types of attacks: DoS, man-in-the-middle, and IP service.

(Essay)
4.7/5
(34)

What is meant by the term buffer overflow?

(Essay)
4.8/5
(31)

____________________ attacks are DoS attacks that are launched from numerous devices.

(Short Answer)
4.9/5
(31)

In a(n) ____________________ attack, a service is inundated with requests, or malformed service requests, which cause a server to hang or freeze, preventing it from responding to input.

(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)