Exam 12: Securing Tcp/Ip Environments

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When users from outside the network attach to a service inside the network, they actually attach to the proxy server, which establishes a proxy session into the private side of the network from there.

(True/False)
4.9/5
(38)

Which of the following software programs can attempt to communicate with any IP-based system while cycling through all valid TCP and UDP port addresses?

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -an ICMP Echo-based operation used to locate active devices on a network

(Short Answer)
4.9/5
(40)

Briefly define proxy server, screening host, and screening router.

(Essay)
4.8/5
(32)

Provide a brief definition of spoofing.

(Essay)
4.7/5
(35)

Which of the following is a process of borrowing identity information, such as an IP address, domain name, NetBIOS name, or TCP or UDP port numbers to hide or deflect interest in attack activities?

(Multiple Choice)
4.9/5
(34)

A(n) ____________________ is a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

(Short Answer)
4.9/5
(42)

Which of the following terms is a hardened computer specifically designed to resist and oppose illicit or unwanted attempts at entry, and whose job is to guard the boundary between internal and external networks?

(Multiple Choice)
4.9/5
(35)

A stealthy attacker may cover its tracks by deleting log files, or terminating any active direct connections. Indicate the answer choice that best completes the statement or answers the question.

(True/False)
4.8/5
(28)

Which of the following serves the purpose of finding out what you have and what is vulnerable?

(Multiple Choice)
4.8/5
(28)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -an IP attack technique whereby an impostor takes over an ongoing communications session between a client and server

(Short Answer)
4.8/5
(37)

What is the difference between an attack and an exploit?

(Essay)
4.9/5
(32)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -any type of network service that permits users elsewhere on a network to use the network to log on to a system as if they were attached locally while operating remotely

(Short Answer)
4.8/5
(27)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a manager system in a DDoS attack

(Short Answer)
4.9/5
(36)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a computer system deliberately set up to attract, entice, and entrap would-be attackers, often by being made to appear part of a larger network

(Short Answer)
4.8/5
(41)

Which type of device makes access control decisions on the basis of application content rather than by looking at IP addresses or port numbers and can act on a host to deny potentially malicious activity?

(Multiple Choice)
4.9/5
(31)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -a document that represents the concrete manifestation of an organization's requirements for security practices, rules, and procedures

(Short Answer)
4.8/5
(39)

According to RFC 4301, what are the goals of IPSec?

(Essay)
4.8/5
(26)

Match each item with a statement below. a.threat b.remote logon service c.PING sweep d.computer forensics e.port scanner f.handler g.session hijacking h.security policy i.honeypot -any activity that represents a potential danger or attack on a system or network

(Short Answer)
4.7/5
(25)

Which of the following best defines an attempt to snoop inside traffic moving across the Internet to look for unprotected account and password information, or to obtain other sensitive information while it's in transit?

(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)