Deck 11: Network Scanning and Vulnerability Scanning

Full screen (f)
exit full mode
Question
Probing your network for security flaws should occur once a quarter,and a complete audit of your security should be completed ________ per year.

A)Once
B)Twice
C)Three times
D)None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password.This is particularly important if your password policy has a history depth of five.

A)Minimum password age
B)Maximum password age
C)Minimum password length
D)Maximum password length
Question
A good password has at least ______ characters.

A)6
B)8
C)10
D)15
Question
The first rule of computer security is to check ___________.

A)Patches
B)Ports
C)Policies
D)None of the above
Question
The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

A)Securitizing
B)Hardening
C)Routing
D)None of the above
Question
A password policy for a 90- or 180-day replacement schedule is called password ________.

A)History
B)Age
C)Uniqueness
D)None of the above
Question
Every open port on a router is a possible avenue of entry for a malware or intruder.
Question
Microsoft Baseline Security Analyzer (MBSA)checks one or more Windows machines to see if they have basic security in place.
Question
A _________ involves setting up two firewalls: an outer and an inner firewall.

A)DMZ (demilitarized zone)
B)proxy server
C)DNS server
D)None of the above
Question
CNE,MCITP,CISSP,and CCNA are examples of industry certifications.
Question
For individual computers not running firewall software,you should directly close ports.
Question
For an individual machine that is not running firewall software,you do not directly close ports.You shut down the _________ using that port.

A)Patch
B)Router
C)Probe
D)None of the above
Question
A good rule of thumb for a password history policy is a history depth of five.
Question
On a server,you should create your own accounts with ________ that do not reflect their level of permission.

A)Names
B)Numbers
C)Passwords
D)None of the above
Question
There should be a firewall between your network and the outside world.
Question
Any _________ you do not explicitly need should be shut down.

A)Patches
B)Ports
C)Policies
D)Probes
Question
Windows has a built in firewall,but Linux does not.
Question
Experience is the most important factor when looking for a security professional.
Question
Nessus is the premiere network vulnerability scanner.
Question
A good password should contain only letters and numbers.
Question
The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

A)Servers
B)Workstations
C)Routers
D)Web servers
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/21
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Network Scanning and Vulnerability Scanning
1
Probing your network for security flaws should occur once a quarter,and a complete audit of your security should be completed ________ per year.

A)Once
B)Twice
C)Three times
D)None of the above
A
2
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the current password.This is particularly important if your password policy has a history depth of five.

A)Minimum password age
B)Maximum password age
C)Minimum password length
D)Maximum password length
A
3
A good password has at least ______ characters.

A)6
B)8
C)10
D)15
B
4
The first rule of computer security is to check ___________.

A)Patches
B)Ports
C)Policies
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
5
The process to make a system as secure as it can be without adding on specialized software or equipment is _______________

A)Securitizing
B)Hardening
C)Routing
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
6
A password policy for a 90- or 180-day replacement schedule is called password ________.

A)History
B)Age
C)Uniqueness
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
7
Every open port on a router is a possible avenue of entry for a malware or intruder.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
8
Microsoft Baseline Security Analyzer (MBSA)checks one or more Windows machines to see if they have basic security in place.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
9
A _________ involves setting up two firewalls: an outer and an inner firewall.

A)DMZ (demilitarized zone)
B)proxy server
C)DNS server
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
10
CNE,MCITP,CISSP,and CCNA are examples of industry certifications.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
11
For individual computers not running firewall software,you should directly close ports.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
12
For an individual machine that is not running firewall software,you do not directly close ports.You shut down the _________ using that port.

A)Patch
B)Router
C)Probe
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
13
A good rule of thumb for a password history policy is a history depth of five.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
14
On a server,you should create your own accounts with ________ that do not reflect their level of permission.

A)Names
B)Numbers
C)Passwords
D)None of the above
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
15
There should be a firewall between your network and the outside world.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
16
Any _________ you do not explicitly need should be shut down.

A)Patches
B)Ports
C)Policies
D)Probes
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
17
Windows has a built in firewall,but Linux does not.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
18
Experience is the most important factor when looking for a security professional.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
19
Nessus is the premiere network vulnerability scanner.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
20
A good password should contain only letters and numbers.
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
21
The rule that packets not originating from inside your LAN should not be forwarded relates to ___________.

A)Servers
B)Workstations
C)Routers
D)Web servers
Unlock Deck
Unlock for access to all 21 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 21 flashcards in this deck.