Deck 8: Network Risk Management

Full screen (f)
exit full mode
Question
The simplest type of firewall is a content filtering firewall.
Use Space or
up arrow
down arrow
to flip the card.
Question
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

A)reverse proxy
B)cache proxy
C)service proxy
D)inverse proxy
Question
If multiple honeypots are connected to form a larger network,what term is used to describe the network?

A)combolure
B)lurenet
C)honeycomb
D)honeynet
Question
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?

A)Nessus
B)metasploit
C)nmap
D)Sub7
Question
Botnets often make use of what chat protocol in order to receive commands?

A)XMPP
B)AIM
C)IRC
D)Skype
Question
The term malware is derived from a combination of the words malicious and software.
Question
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

A)buffer overflow
B)session hijacking attack
C)man-in-the-middle attack
D)banner-grabbing attack
Question
Which software below serves as the firewall for Linux systems?

A)ZoneAlarm
B)Comodo
C)iptables
D)ipf
Question
Programs that run independently and travel between computers and across networks,such as by e-mail attachment or virtually any kind of file transfer,are known as which option below?

A)file-infector viruses
B)worms
C)network viruses
D)macro viruses
Question
A reflective attack can be increased in intensity by combining it with what type of attack?

A)smurf attack
B)SYN attack
C)amplification attack
D)friendly attack
Question
Different types of organizations have similar levels of network security risks.
Question
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size,and internal instructions)to avoid detection?

A)encryption
B)stealth
C)polymorphism
D)time dependence
Question
A SOHO wireless router typically acts as a firewall and may include packet filtering options.
Question
What type of virus are dormant until a specific condition is met,such as the changing of a file or a match of the current date?

A)encrypted virus
B)logic bomb
C)boot sector virus
D)worm
Question
A firewall typically involves a combination of hardware and software.
Question
A system that is capable of collecting and analyzing information generated by firewalls,IDS,and IPS systems is known as which term below?

A)event collector architecture
B)syslog system
C)SIEM system
D)log organizer
Question
At what layer of the OSI model do firewalls operate?

A)Transport
B)Data link
C)Network
D)Application
Question
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

A)Natas
B)Macro
C)Michelangelo
D)Stoned
Question
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?

A)banner-grabbing attack
B)reflective attack
C)friendly attack
D)IP spoofing attack
Question
What kind of attack involves a flood of broadcast ping messages,with the originating source address being spoofed to appear as a host on the network?

A)amplification attack
B)smurf attack
C)zombie attack
D)SYN attack
Question
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?

A)honeypot
B)pandora box
C)trap
D)lure
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion detection that protects an entire network and is situatedat the edge of the network or in a network's protectiveperimeter,known as the DMZ (demilitarized zone).Here,itcan detect many types of suspicious traffic patterns.
Question
A _________________ form is a document that is used to ensure that employees are aware of the fact that their use of company equipment and accounts will be monitored and reviewed as needed for security purposes.
Question
In ACL statements,the any keyword is equivalent to using which wildcard mask?

A)255.255.255.255
B)0.0.0.0
C)0.0.255.255
D)255.255.0.0
Question
What two types of agents are used to check compliance with network security policies?

A)dissolvable agent
B)temporary agent
C)persistent agent
D)permanent agent
Question
What two options below are IDS implementations used to provide additional security on a network?

A)IIDS
B)PIDS
C)HIDS
D)NIDS
Question
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?

A)reflectors
B)botnet
C)zombie army
D)repeaters
Question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?

A)transparent wire mode
B)virtual access mode
C)pass-thru mode
D)virtual wire mode
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A portion of the security policythat explains to users what they can and cannot do,andpenalties for violations.It might also describe how thesemeasures protect the network's security.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A software security flaw that can allow unauthorizedusers to gain access to a system.Legacy systems areparticularly notorious for leaving these kinds of gaps in anetwork's overall security net.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion prevention that runs on a single computer,such as aclient or server,to intercept and help prevent attacks againstthat one host.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A program that runs independently and travelsbetween computers and across networks.Although wormsdo not alter other programs as viruses do,they can carryviruses.
Question
What feature on some network switches can be used to detect faked arp messages?

A)DHCP snooping
B)session monitoring
C)dynamic packet inspection
D)dynamic ARP inspection
Question
Which two viruses below are examples of boot sector viruses?

A)Michelangelo
B)Stoned
C)Natas
D)Klez
Question
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
Question
Networks that use ________________,such as T-1 or DSL connections to the Internet,are vulnerable to eavesdropping at a building' s demarc (demarcation point),at aremote switching facility,or in a central office.
Question
A ______________ on a device attempts to alter management interfaces within the hardware to the point where the device is irreparable.
Question
Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

A)EmSec
B)TEMPEST
C)RFGUARD
D)BlockSec
Question
The _____________ proxy server software is available for use on the UNIX / Linux platform.
Question
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?

A)mining
B)phishing
C)hunting
D)doxing
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A specification created by the NSA to define protectionstandards against RF emanation,which when implementedare called EmSec (emission security).
Question
Describe some of the characteristics of malware that make it difficult to detect.
Question
Describe two different implementations of IDS that can be deployed on a network.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A threat to networked hosts in which the hostis flooded with broadcast ping messages.A smurf attack is atype of denial-of-service attack.
Question
Define what a file-infector virus is.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion detection that runs on a single computer,such as aclient or server,to alert about attacks against that one host.
Question
Describe a boot sector virus.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A program that replicates itself to infect more computers,either through network connections when it piggybackson other files or through exchange of external storagedevices,such as USB drives,passed among users.
Question
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A software application on a network host thatacts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic and providing one address to the outside world,instead of revealing the addresses of internal LAN devices.
Question
List and describe the four different locations in which anti-malware can be installed.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Network Risk Management
1
The simplest type of firewall is a content filtering firewall.
False
2
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

A)reverse proxy
B)cache proxy
C)service proxy
D)inverse proxy
A
3
If multiple honeypots are connected to form a larger network,what term is used to describe the network?

A)combolure
B)lurenet
C)honeycomb
D)honeynet
D
4
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?

A)Nessus
B)metasploit
C)nmap
D)Sub7
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Botnets often make use of what chat protocol in order to receive commands?

A)XMPP
B)AIM
C)IRC
D)Skype
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The term malware is derived from a combination of the words malicious and software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?

A)buffer overflow
B)session hijacking attack
C)man-in-the-middle attack
D)banner-grabbing attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Which software below serves as the firewall for Linux systems?

A)ZoneAlarm
B)Comodo
C)iptables
D)ipf
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Programs that run independently and travel between computers and across networks,such as by e-mail attachment or virtually any kind of file transfer,are known as which option below?

A)file-infector viruses
B)worms
C)network viruses
D)macro viruses
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
A reflective attack can be increased in intensity by combining it with what type of attack?

A)smurf attack
B)SYN attack
C)amplification attack
D)friendly attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Different types of organizations have similar levels of network security risks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size,and internal instructions)to avoid detection?

A)encryption
B)stealth
C)polymorphism
D)time dependence
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A SOHO wireless router typically acts as a firewall and may include packet filtering options.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
What type of virus are dormant until a specific condition is met,such as the changing of a file or a match of the current date?

A)encrypted virus
B)logic bomb
C)boot sector virus
D)worm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
A firewall typically involves a combination of hardware and software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
A system that is capable of collecting and analyzing information generated by firewalls,IDS,and IPS systems is known as which term below?

A)event collector architecture
B)syslog system
C)SIEM system
D)log organizer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
At what layer of the OSI model do firewalls operate?

A)Transport
B)Data link
C)Network
D)Application
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

A)Natas
B)Macro
C)Michelangelo
D)Stoned
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?

A)banner-grabbing attack
B)reflective attack
C)friendly attack
D)IP spoofing attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What kind of attack involves a flood of broadcast ping messages,with the originating source address being spoofed to appear as a host on the network?

A)amplification attack
B)smurf attack
C)zombie attack
D)SYN attack
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?

A)honeypot
B)pandora box
C)trap
D)lure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion detection that protects an entire network and is situatedat the edge of the network or in a network's protectiveperimeter,known as the DMZ (demilitarized zone).Here,itcan detect many types of suspicious traffic patterns.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A _________________ form is a document that is used to ensure that employees are aware of the fact that their use of company equipment and accounts will be monitored and reviewed as needed for security purposes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
In ACL statements,the any keyword is equivalent to using which wildcard mask?

A)255.255.255.255
B)0.0.0.0
C)0.0.255.255
D)255.255.0.0
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
What two types of agents are used to check compliance with network security policies?

A)dissolvable agent
B)temporary agent
C)persistent agent
D)permanent agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What two options below are IDS implementations used to provide additional security on a network?

A)IIDS
B)PIDS
C)HIDS
D)NIDS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?

A)reflectors
B)botnet
C)zombie army
D)repeaters
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?

A)transparent wire mode
B)virtual access mode
C)pass-thru mode
D)virtual wire mode
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A portion of the security policythat explains to users what they can and cannot do,andpenalties for violations.It might also describe how thesemeasures protect the network's security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A software security flaw that can allow unauthorizedusers to gain access to a system.Legacy systems areparticularly notorious for leaving these kinds of gaps in anetwork's overall security net.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion prevention that runs on a single computer,such as aclient or server,to intercept and help prevent attacks againstthat one host.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A program that runs independently and travelsbetween computers and across networks.Although wormsdo not alter other programs as viruses do,they can carryviruses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
What feature on some network switches can be used to detect faked arp messages?

A)DHCP snooping
B)session monitoring
C)dynamic packet inspection
D)dynamic ARP inspection
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Which two viruses below are examples of boot sector viruses?

A)Michelangelo
B)Stoned
C)Natas
D)Klez
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
The ________________ utility is a Windows console that is used to control what users do and how the system can be used.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Networks that use ________________,such as T-1 or DSL connections to the Internet,are vulnerable to eavesdropping at a building' s demarc (demarcation point),at aremote switching facility,or in a central office.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A ______________ on a device attempts to alter management interfaces within the hardware to the point where the device is irreparable.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

A)EmSec
B)TEMPEST
C)RFGUARD
D)BlockSec
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The _____________ proxy server software is available for use on the UNIX / Linux platform.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?

A)mining
B)phishing
C)hunting
D)doxing
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A specification created by the NSA to define protectionstandards against RF emanation,which when implementedare called EmSec (emission security).
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Describe some of the characteristics of malware that make it difficult to detect.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe two different implementations of IDS that can be deployed on a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A threat to networked hosts in which the hostis flooded with broadcast ping messages.A smurf attack is atype of denial-of-service attack.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Define what a file-infector virus is.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A type ofintrusion detection that runs on a single computer,such as aclient or server,to alert about attacks against that one host.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Describe a boot sector virus.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A program that replicates itself to infect more computers,either through network connections when it piggybackson other files or through exchange of external storagedevices,such as USB drives,passed among users.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Matching
Match each correct item with the statement below.
a.acceptable use policy (AUP)
b.backdoor
c.HIDS (host-based intrusion detection system)
d.HIPS (host-based intrusion prevention system)
e.NIDS (network-based intrusion detection system)
f.proxy service
g.smurf attack
h.TEMPEST
i.virus
j.worm
A software application on a network host thatacts as an intermediary between the external and internal networks,screening all incoming and outgoing traffic and providing one address to the outside world,instead of revealing the addresses of internal LAN devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List and describe the four different locations in which anti-malware can be installed.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.