Deck 23: Security Software

Full screen (f)
exit full mode
Question
A list of ports that are in use can be obtained through the ____ utility.

A)NBTSTAT
B)IPCONFIG
C)NETSTAT
D)TCPSTAT
Use Space or
up arrow
down arrow
to flip the card.
Question
Cracking a password can take many different routes.
Question
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n)____ is made available.

A)Internet Rights Policy
B)Acceptable Use Policy
C)Internet Abuse Policy
D)Standard Rights Policy
Question
The ____ technique tries all combinations of letters,numbers,and symbols until eventually landing on the correct password.

A)dictionary
B)brute force
C)computed hash
D)linear hash
Question
Security policies and procedures should be static.
Question
The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.
Question
The command ____ translates certain names into their associated IP addresses or port numbers.

A)netstat -n
B)netstat -r -n
C)netstat -a
D)netstat -a -n
Question
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A)DDOS
B)DOS
C)DDOD
D)DOD
Question
Capturing packets is also referred to as ____.

A)packet stiffing
B)packet sniffing
C)packet hiding
D)packet blocking
Question
A(n)____________________ describes the steps needed to execute the policy.
Question
____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.

A)GFI LANguard
B)NetCat
C)L0phtCrack
D)Brutus
Question
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Question
A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.

A)false negative
B)true negative
C)true positive
D)false positive
Question
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
Question
A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.
Question
A(n)____________________ will take action on its own to handle the problem without user intervention,such as interrupting the offending traffic.
Question
There are only two ways to help prevent a password from being cracked.
Question
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A)block port
B)pan port
C)management port
D)mirror port
Question
When the network adapter is placed into promiscuous mode,it allows all received packets to pass up into the TCP/IP stack.
Question
A ____ provides the rules and expectations and the consequences of not following the rules.

A)password policy
B)software policy
C)security policy
D)network policy
Question
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Question
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Examines network traffic for known attack signatures
Question
Describe host-based intrusion detection.
Question
How do you prevent booting from a USB thumb drive?
Question
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Composed of information commonly known about the individual
Question
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Question
Describe the educational,diagnostics,network baseline measurements,and security reasons to capture network traffic.
Question
Discuss the process of guessing a password.
Question
List and describe what a typical AUP contains.
Question
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Typically the most time consuming way to crack a password
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 23: Security Software
1
A list of ports that are in use can be obtained through the ____ utility.

A)NBTSTAT
B)IPCONFIG
C)NETSTAT
D)TCPSTAT
C
2
Cracking a password can take many different routes.
True
3
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n)____ is made available.

A)Internet Rights Policy
B)Acceptable Use Policy
C)Internet Abuse Policy
D)Standard Rights Policy
B
4
The ____ technique tries all combinations of letters,numbers,and symbols until eventually landing on the correct password.

A)dictionary
B)brute force
C)computed hash
D)linear hash
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Security policies and procedures should be static.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
The command ____ translates certain names into their associated IP addresses or port numbers.

A)netstat -n
B)netstat -r -n
C)netstat -a
D)netstat -a -n
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
A sophisticated denial of service attack that is spread out to many attacking computer systems is called a ____.

A)DDOS
B)DOS
C)DDOD
D)DOD
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
Capturing packets is also referred to as ____.

A)packet stiffing
B)packet sniffing
C)packet hiding
D)packet blocking
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
A(n)____________________ describes the steps needed to execute the policy.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.

A)GFI LANguard
B)NetCat
C)L0phtCrack
D)Brutus
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.

A)false negative
B)true negative
C)true positive
D)false positive
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
A(n)____________________ will take action on its own to handle the problem without user intervention,such as interrupting the offending traffic.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
There are only two ways to help prevent a password from being cracked.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

A)block port
B)pan port
C)management port
D)mirror port
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
When the network adapter is placed into promiscuous mode,it allows all received packets to pass up into the TCP/IP stack.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
A ____ provides the rules and expectations and the consequences of not following the rules.

A)password policy
B)software policy
C)security policy
D)network policy
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Uses a list of common passwords to try to crack an unknown password
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Examines network traffic for known attack signatures
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Describe host-based intrusion detection.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
How do you prevent booting from a USB thumb drive?
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Composed of information commonly known about the individual
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
Describe the educational,diagnostics,network baseline measurements,and security reasons to capture network traffic.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Discuss the process of guessing a password.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
List and describe what a typical AUP contains.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
Match each item with a statement below.
a.Snort
d.Brute force
b.Weak password
e.Intrusion detection
c.Dictionary attack
Typically the most time consuming way to crack a password
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.