Exam 9: Network Vulnerability Assessment
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
The CVSS ____ Score is set by the organization using the software.
(Multiple Choice)
4.8/5
(26)
____ verify that an organization's security policies are prudent (cover the right issues) and are being implemented correctly.
(Multiple Choice)
4.8/5
(33)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-A free, client-based network protocol analyzer.
(Short Answer)
4.8/5
(38)
Wired networks are just as vulnerable to sniffing as wireless networks.
(True/False)
4.8/5
(19)
____________________, also known as "fuzzing," is a straight-forward technique that looks for vulnerabilities in a program or protocol by feeding random input into the program or the network running the protocol.
(Short Answer)
4.8/5
(41)
The ____ command, available on most popular Web browsers, allows users to see the source code behind the page.
(Multiple Choice)
4.9/5
(31)
The most realistic type of penetration test is a ____ box test.
(Multiple Choice)
4.8/5
(42)
A(n) ____ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.
(Multiple Choice)
4.8/5
(24)
Organizations are safe from sniffer attacks when their computing environment is primarily a switched network environment.
(True/False)
4.8/5
(28)
The printf (user_input); command in C has the potential to cause a(n) ____ vulnerability.
(Multiple Choice)
4.8/5
(33)
Explain the two points administrators should remember if they are wary of using the same tools that attackers use.
(Essay)
4.8/5
(35)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-Monitors the airwaves for any new devices or access points.
(Short Answer)
4.8/5
(33)
Why can the failure to validate how user input is handled result in a cross-site scripting attack?
(Essay)
4.8/5
(39)
Describe how the criticality of the affected assets must be taken into account when conducting a risk assessment for a vulnerability.
(Essay)
4.7/5
(35)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-Uses incrementing Time-to-Live (TTL) packets to determine the path into a network as well as the default firewall policy.
(Short Answer)
4.9/5
(36)
Match each item with a statement below.
a.Sam Spade
f.NetStumbler
b.Wget
g.AirSnare
c.Nmap "Idle scanning" option
h.Aircrack-ng
d.Firewalk
i.Wireshark
e.XProbe2
-A freeware tool that applies packet sniffing to wireless networks.
(Short Answer)
4.9/5
(43)
A ____ (sometimes called a network protocol analyzer) is a network tool that collects copies of packets from the network and analyzes them or stores the packets for later analysis.
(Multiple Choice)
4.9/5
(36)
Implementing applications that verify the true communication destination during execution help prevent vulnerabilities associated with ____.
(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)