Deck 23: Security Software

Full screen (f)
exit full mode
Question
Cracking a password can take many different routes.
Use Space or
up arrow
down arrow
to flip the card.
Question
There are only two ways to help prevent a password from being cracked.
Question
Capturing packets is also referred to as ____.

A) packet stiffing
B) packet sniffing
C) packet hiding
D) packet blocking
Question
A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.

A) false negative
B) true negative
C) true positive
D) false positive
Question
A(n) ____________________ describes the steps needed to execute the policy.
Question
____ is a vulnerability scanner that will scan the host system, or any and all computers on the local network or anywhere on the Internet.

A) GFI LANguard
B) NetCat
C) L0phtCrack
D) Brutus
Question
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A) dictionary
B) brute force
C) computed hash
D) linear hash
Question
The command ____ translates certain names into their associated IP addresses or port numbers.

A) netstat -n
B) netstat -r -n
C) netstat -a
D) netstat -a -n
Question
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
Question
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A) DDOS
B) DOS
C) DDOD
D) DOD
Question
When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.
Question
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Question
A ____ provides the rules and expectations and the consequences of not following the rules.

A) password policy
B) software policy
C) security policy
D) network policy
Question
A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
Question
A list of ports that are in use can be obtained through the ____ utility.

A) NBTSTAT
B) IPCONFIG
C) NETSTAT
D) TCPSTAT
Question
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A) block port
B) pan port
C) management port
D) mirror port
Question
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.

A) Internet Rights Policy
B) Acceptable Use Policy
C) Internet Abuse Policy
D) Standard Rights Policy
Question
The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.
Question
Security policies and procedures should be static.
Question
A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.
Question
How do you prevent booting from a USB thumb drive?
Question
Match between columns
Composed of information commonly known about the individual
Weak password
Composed of information commonly known about the individual
Brute force
Composed of information commonly known about the individual
Dictionary attack
Composed of information commonly known about the individual
Intrusion detection
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Weak password
Typically the most time consuming way to crack a password
Brute force
Typically the most time consuming way to crack a password
Dictionary attack
Typically the most time consuming way to crack a password
Intrusion detection
Typically the most time consuming way to crack a password
Snort
Uses a list of common passwords to try to crack an unknown password
Weak password
Uses a list of common passwords to try to crack an unknown password
Brute force
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Snort
Examines network traffic for known attack signatures
Weak password
Examines network traffic for known attack signatures
Brute force
Examines network traffic for known attack signatures
Dictionary attack
Examines network traffic for known attack signatures
Intrusion detection
Examines network traffic for known attack signatures
Snort
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Weak password
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Brute force
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Intrusion detection
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Snort
Question
Discuss the process of guessing a password.
Question
Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.
Question
List and describe what a typical AUP contains.
Question
Describe host-based intrusion detection.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 23: Security Software
1
Cracking a password can take many different routes.
True
2
There are only two ways to help prevent a password from being cracked.
False
3
Capturing packets is also referred to as ____.

A) packet stiffing
B) packet sniffing
C) packet hiding
D) packet blocking
B
4
A ____ is an alert given when normal, non-malicious traffic happens to match one or more rules for malicious traffic.

A) false negative
B) true negative
C) true positive
D) false positive
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
A(n) ____________________ describes the steps needed to execute the policy.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a vulnerability scanner that will scan the host system, or any and all computers on the local network or anywhere on the Internet.

A) GFI LANguard
B) NetCat
C) L0phtCrack
D) Brutus
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ technique tries all combinations of letters, numbers, and symbols until eventually landing on the correct password.

A) dictionary
B) brute force
C) computed hash
D) linear hash
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
The command ____ translates certain names into their associated IP addresses or port numbers.

A) netstat -n
B) netstat -r -n
C) netstat -a
D) netstat -a -n
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A) DDOS
B) DOS
C) DDOD
D) DOD
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
When the network adapter is placed into promiscuous mode, it allows all received packets to pass up into the TCP/IP stack.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ provides the rules and expectations and the consequences of not following the rules.

A) password policy
B) software policy
C) security policy
D) network policy
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
A list of ports that are in use can be obtained through the ____ utility.

A) NBTSTAT
B) IPCONFIG
C) NETSTAT
D) TCPSTAT
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A) block port
B) pan port
C) management port
D) mirror port
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.

A) Internet Rights Policy
B) Acceptable Use Policy
C) Internet Abuse Policy
D) Standard Rights Policy
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
The most common approaches to password ____________________ are guessing, brute force, and dictionary attacks.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
Security policies and procedures should be static.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ____________________ will take action on its own to handle the problem without user intervention, such as interrupting the offending traffic.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
How do you prevent booting from a USB thumb drive?
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Composed of information commonly known about the individual
Weak password
Composed of information commonly known about the individual
Brute force
Composed of information commonly known about the individual
Dictionary attack
Composed of information commonly known about the individual
Intrusion detection
Composed of information commonly known about the individual
Snort
Typically the most time consuming way to crack a password
Weak password
Typically the most time consuming way to crack a password
Brute force
Typically the most time consuming way to crack a password
Dictionary attack
Typically the most time consuming way to crack a password
Intrusion detection
Typically the most time consuming way to crack a password
Snort
Uses a list of common passwords to try to crack an unknown password
Weak password
Uses a list of common passwords to try to crack an unknown password
Brute force
Uses a list of common passwords to try to crack an unknown password
Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Intrusion detection
Uses a list of common passwords to try to crack an unknown password
Snort
Examines network traffic for known attack signatures
Weak password
Examines network traffic for known attack signatures
Brute force
Examines network traffic for known attack signatures
Dictionary attack
Examines network traffic for known attack signatures
Intrusion detection
Examines network traffic for known attack signatures
Snort
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Weak password
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Brute force
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Intrusion detection
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Snort
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Discuss the process of guessing a password.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Describe the educational, diagnostics, network baseline measurements, and security reasons to capture network traffic.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
List and describe what a typical AUP contains.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Describe host-based intrusion detection.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 26 flashcards in this deck.