Exam 23: Security Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

A

Discuss the process of guessing a password.

Free
(Essay)
4.8/5
(28)
Correct Answer:
Verified

Guessing a password can be a completely random approach. Just typing in words or combinations of letters, numbers, and symbols until one of them works, however, does not stand much of a chance at success. Often it is not even necessary to crack a password, as the user has made it easy for you to determine the password with little effort. This could be as simple as the user placing a sticky note on the bottom of their keyboard with their username and password written out clearly. Perhaps the user has created a password that is composed of information commonly known about the individual, such as their birthday, children or pet names, favorite color, nickname, or other personally relevant information. Does the user have a custom license plate? That should go on the list of possible passwords too. These are all examples of a weak password.

A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

active IDS

Describe host-based intrusion detection.

(Essay)
4.9/5
(28)

The command ____ translates certain names into their associated IP addresses or port numbers.

(Multiple Choice)
4.7/5
(38)

A(n) ____________________ describes the steps needed to execute the policy.

(Short Answer)
4.7/5
(35)

In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.

(Multiple Choice)
4.9/5
(51)

Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.

(Essay)
4.9/5
(26)

One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

(Multiple Choice)
4.8/5
(36)

How do you prevent booting from a USB thumb drive?

(Essay)
4.9/5
(36)
Match each item with a statement below.
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Correct Answer:
Verified
Premises:
Responses:
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Examines network traffic for known attack signatures
Brute force
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Weak password
(Matching)
4.8/5
(28)

Security policies and procedures should be static.

(True/False)
4.8/5
(31)

A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.

(Multiple Choice)
4.7/5
(36)

Capturing packets is also referred to as ____.

(Multiple Choice)
4.8/5
(35)

A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.

(Short Answer)
4.9/5
(35)

Cracking a password can take many different routes.

(True/False)
4.8/5
(33)

Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.

(Short Answer)
4.9/5
(37)

When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.

(True/False)
4.8/5
(36)

The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

(Multiple Choice)
4.8/5
(28)

The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.

(Short Answer)
4.8/5
(32)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)