Deck 11: Securing Your Network

Full screen (f)
exit full mode
Question
Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?

A)Telnet
B)NAT
C)VPN
D)DMZ
Use Space or
up arrow
down arrow
to flip the card.
Question
A proxy can enhance performance through caching and filter communications.
Question
A set of filtering rules,called a ____,is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
Question
Which protocol secures IP at the Network layer by using secure communications and encryptions standards?

A)SSL
B)TLS
C)IPSec
D)RSA
Question
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
Question
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
Question
Which of the following is a program that appears useful,but instead does harm to a user's computer?

A)virus
B)buffer attack
C)Trojan horse
D)worm
Question
It is best to secure your wireless network in order to prevent which of the following types of attacks that involve the attacker using a portable computer and an omnidirectional antenna?

A)spamming
B)war drive
C)port-scanning
D)sniffer attack
Question
Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?

A)denial-of-service attack
B)buffer attack
C)Trojan horse
D)worm
Question
A router can perform packet filtering and can be used as a firewall on a network.
Question
One step in hardening a system involves deploying all available services on your system,thereby confusing a potential attacker.
Question
Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

A)social engineering
B)psychological warfare
C)inside attack
D)spoofing
Question
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
Question
Stateless filtering screens on the basis of the context of the communication.
Question
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)proxy
C)switch
D)hub
Question
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer,such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
Question
____ is unrequested e-mail that is sent to hundreds,thousands,or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
Question
Which of the following occurs when the attacker is able to intercept or monitor transmissions meant for a different computer?

A)source routing
B)application-layer attack
C)man-in-the-middle attack
D)buffer attack
Question
A(n)____ is information that a Web server stores on a client computer,such as the client's preferences when accessing a particular Web site,or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
Question
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system,but does not create new files.

A)buffer attack
B)virus
C)worm
D)hoax
Question
A ____________________ is not a virus,but an e-mail falsely warning of a virus.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a program that endlessly replicates on the same computer,or that sends itself to many other computers on a network.
Question
Which of the following is a portion of a network that exists between two or more networks such as a network between a private network and the Internet?

A)proxy
B)DMZ
C)subnet
D)firewall
Question
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
Question
Which of the following could be an exploit that occurs at the Network layer? (Choose all that apply.)

A)exploits that involve TCP ports
B)exploits that involve packet addressing
C)exploits that involve routing
D)exploits that involve DNS
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
used by attackers to associate IP address information with account and password communications.
Question
Which of the following are border points that should be protected with a strong border security design? (Choose all that apply.)

A)VPN access
B)LAN cabling access
C)802.11 access
D)internal switch port access
Question
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
Question
_________________________ is the part of IPSec that encrypts data.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
provides information about all kinds of security threats.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
command line interface that enables you to configure packet filter rules through the use of tables.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a portion of a network that exists between two or more networks that have different security measures in place
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a list of permit and deny conditions that can be associated with a particular router interface.
Question
Which of the following are criteria upon which a router can make filtering decisions? (Choose all that apply.)

A)protocol
B)application data
C)MAC address
D)network ID
Question
Which of the following are steps to keep in mind when hardening a system? (Choose all that apply.)

A)learn about new threats and how to handle them
B)regularly audit security configuration
C)focus your attention on PC operating systems since mobile operating systems are not vulnerable to attack
D)monitor for evidence of attacker
Question
Identify four network hardening techniques.
Question
_________________________ packet filtering tracks information about a communication session such as which ports are in use.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
used between network computers to verify the authenticity of the communication.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
might take the form of simply flooding a system with more packets than it can handle.
Question
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
software that reports back information-to an attacker or an advertiser,for example-about that computer user's activities.
Question
Briefly describe network address translation.
Question
How does a buffer attack work?
Question
Identify four tasks that can be fulfilled by a proxy server.
Question
What is spoofing and how can it be used to attack a computer or network?
Question
Compare and contrast stateful versus stateless packet filtering
Question
Identify five border points that the strongest border security is designed to protect.
Question
What are the advantages of using Network Address Translation (NAT)?
Question
Provide a general description for how routers are used in border security.
Question
Describe a man-in-the-middle attack.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Securing Your Network
1
Which technology discourages attackers because they cannot identify a specific computer to attack on the internal network?

A)Telnet
B)NAT
C)VPN
D)DMZ
B
2
A proxy can enhance performance through caching and filter communications.
True
3
A set of filtering rules,called a ____,is applied to packets through the use of IPTables.

A)link
B)group
C)cluster
D)chain
D
4
Which protocol secures IP at the Network layer by using secure communications and encryptions standards?

A)SSL
B)TLS
C)IPSec
D)RSA
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
5
A rogue Web site is one that performs unlawful activity or that puts the user who accesses it at risk.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
6
____ can translate an IP address from a private network to a different address used on a public network or the Internet.

A)IPSec
B)DHCP
C)TCP/IP
D)NAT
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a program that appears useful,but instead does harm to a user's computer?

A)virus
B)buffer attack
C)Trojan horse
D)worm
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
8
It is best to secure your wireless network in order to prevent which of the following types of attacks that involve the attacker using a portable computer and an omnidirectional antenna?

A)spamming
B)war drive
C)port-scanning
D)sniffer attack
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?

A)denial-of-service attack
B)buffer attack
C)Trojan horse
D)worm
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
10
A router can perform packet filtering and can be used as a firewall on a network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
11
One step in hardening a system involves deploying all available services on your system,thereby confusing a potential attacker.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
12
Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

A)social engineering
B)psychological warfare
C)inside attack
D)spoofing
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ layer reads IP packet protocol address information and forwards each packet along the most expedient route for efficient network communications.

A)Data Link
B)Transport
C)Network
D)Physical
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
14
Stateless filtering screens on the basis of the context of the communication.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
15
A border ____ is a firewall that is configured with security policies to control the traffic that is permitted to cross a border in either direction.

A)gateway
B)proxy
C)switch
D)hub
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
16
Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer,such as a Web server.

A)network
B)presentation
C)presentation
D)circuit
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
17
____ is unrequested e-mail that is sent to hundreds,thousands,or even millions of users.

A)Freeware
B)Adware
C)Spam
D)Malware
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following occurs when the attacker is able to intercept or monitor transmissions meant for a different computer?

A)source routing
B)application-layer attack
C)man-in-the-middle attack
D)buffer attack
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
19
A(n)____ is information that a Web server stores on a client computer,such as the client's preferences when accessing a particular Web site,or where the client has been on the Web site.

A)applet
B)cookie
C)scanner
D)listener
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
20
A(n)____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system,but does not create new files.

A)buffer attack
B)virus
C)worm
D)hoax
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
21
A ____________________ is not a virus,but an e-mail falsely warning of a virus.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
22
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a program that endlessly replicates on the same computer,or that sends itself to many other computers on a network.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is a portion of a network that exists between two or more networks such as a network between a private network and the Internet?

A)proxy
B)DMZ
C)subnet
D)firewall
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
24
A DoS attack that floods a host with packets from many bogus source addresses is a form of ____________________.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following could be an exploit that occurs at the Network layer? (Choose all that apply.)

A)exploits that involve TCP ports
B)exploits that involve packet addressing
C)exploits that involve routing
D)exploits that involve DNS
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
26
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
used by attackers to associate IP address information with account and password communications.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following are border points that should be protected with a strong border security design? (Choose all that apply.)

A)VPN access
B)LAN cabling access
C)802.11 access
D)internal switch port access
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)____________________ is a computer that is located between a computer on an internal network and a computer on an external network with which the internal computer is communicating.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
29
_________________________ is the part of IPSec that encrypts data.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
30
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
provides information about all kinds of security threats.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
command line interface that enables you to configure packet filter rules through the use of tables.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
32
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a portion of a network that exists between two or more networks that have different security measures in place
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
33
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
a list of permit and deny conditions that can be associated with a particular router interface.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following are criteria upon which a router can make filtering decisions? (Choose all that apply.)

A)protocol
B)application data
C)MAC address
D)network ID
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following are steps to keep in mind when hardening a system? (Choose all that apply.)

A)learn about new threats and how to handle them
B)regularly audit security configuration
C)focus your attention on PC operating systems since mobile operating systems are not vulnerable to attack
D)monitor for evidence of attacker
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
36
Identify four network hardening techniques.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
37
_________________________ packet filtering tracks information about a communication session such as which ports are in use.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
38
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
used between network computers to verify the authenticity of the communication.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
might take the form of simply flooding a system with more packets than it can handle.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
40
Match each term with the correct statement below.
a.worm
b.demilitarized zone
c.National Security Institute (NSI)
d.remote denial of service (DoS) attack
e.sniffer software
f.digital certificate
g.access control list (ACL)
h.IPTables
i.spyware
software that reports back information-to an attacker or an advertiser,for example-about that computer user's activities.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe network address translation.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
42
How does a buffer attack work?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
43
Identify four tasks that can be fulfilled by a proxy server.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
44
What is spoofing and how can it be used to attack a computer or network?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
45
Compare and contrast stateful versus stateless packet filtering
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
46
Identify five border points that the strongest border security is designed to protect.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
47
What are the advantages of using Network Address Translation (NAT)?
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
48
Provide a general description for how routers are used in border security.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
49
Describe a man-in-the-middle attack.
Unlock Deck
Unlock for access to all 49 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 49 flashcards in this deck.