Deck 1: Network Security Fundamentals
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 1: Network Security Fundamentals
1
Which of the following is a type of script that automates repetitive tasks in an application such as a word processor but can also be programmed to be a virus?
A) worm
B) macro
C) back door
D) Trojan
A) worm
B) macro
C) back door
D) Trojan
B
2
Which security layer verifies the identity of a user,service,or computer?
A) authentication
B) repudiation
C) physical security
D) authorization
A) authentication
B) repudiation
C) physical security
D) authorization
A
3
A worm creates files that copy themselves repeatedly and consume disk space.
True
4
Which type of attack works by an attacker operating between two computers in a network and impersonating one computer to intercept communications?
A) malicious port scanning
B) man-in-the-middle
C) denial of service
D) remote procedure call
A) malicious port scanning
B) man-in-the-middle
C) denial of service
D) remote procedure call
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is NOT one of the three primary goals of information security?
A) confidentiality
B) integrity
C) impartiality
D) availability
A) confidentiality
B) integrity
C) impartiality
D) availability
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
What is a VPN typically used for?
A) secure remote access
B) detection of security threats
C) block open ports
D) filter harmful scripts
A) secure remote access
B) detection of security threats
C) block open ports
D) filter harmful scripts
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Which type of attack causes the operating system to crash because it is unable to handle arbitrary data sent to a port?
A) RPC attacks
B) ICMP message abuse
C) malicious port scanning
D) SYN flood
A) RPC attacks
B) ICMP message abuse
C) malicious port scanning
D) SYN flood
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In which form of authentication does the authenticating device generate a random code and send it to the user who wants to be authenticated?
A) basic
B) challenge/response
C) biometrics
D) signature
A) basic
B) challenge/response
C) biometrics
D) signature
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
What is the name of a storage area where viruses are placed by antivirus software so they cannot replicate or do harm to other files?
A) firewall
B) recycle bin
C) quarantine
D) demilitarized zone
A) firewall
B) recycle bin
C) quarantine
D) demilitarized zone
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Defense in depth can best be described as which of the following?
A) a firewall that protects the network and the servers
B) a layered approach to security
C) antivirus software and firewalls
D) authentication and encryption
A) a firewall that protects the network and the servers
B) a layered approach to security
C) antivirus software and firewalls
D) authentication and encryption
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
A hactivist can best be described as which of the following?
A) an unskilled programmer that spreads malicious scripts
B) consider themselves seekers of knowledge
C) use DoS attacks on Web sites with which they disagree
D) deface Web sites by leaving messages for their friends to read
A) an unskilled programmer that spreads malicious scripts
B) consider themselves seekers of knowledge
C) use DoS attacks on Web sites with which they disagree
D) deface Web sites by leaving messages for their friends to read
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What can an attacker use a port scanner to test for on a target computer?
A) invalid IP addresses
B) SYN flags
C) open sockets
D) ping floods
A) invalid IP addresses
B) SYN flags
C) open sockets
D) ping floods
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Reviewing log files is a time-consuming task and therefore should only be done when an attack on the network has occurred.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
With discretionary access control,network users can share information with other users,making it more risky than MAC.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What is a program that appears to do something useful but is actually malware?
A) virus
B) logic bomb
C) Trojan
D) back door
A) virus
B) logic bomb
C) Trojan
D) back door
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Physical security protects a system from theft,fire,or environmental disaster.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Why might you want your security system to provide nonrepudiation?
A) to prevent a user from capturing packets and viewing sensitive information
B) to prevent an unauthorized user from logging into the system
C) to trace the origin of a worm spread through email
D) so a user can't deny sending or receiving a communication
A) to prevent a user from capturing packets and viewing sensitive information
B) to prevent an unauthorized user from logging into the system
C) to trace the origin of a worm spread through email
D) so a user can't deny sending or receiving a communication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which term is best described as an attack that relies on the gullibility of people?
A) malicious code
B) script kiddie
C) back door
D) social engineering
A) malicious code
B) script kiddie
C) back door
D) social engineering
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
A packet monkey is an unskilled programmer who spreads viruses and other malicious scripts to exploit computer weaknesses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Malware that creates networks of infected computers that can be controlled from a central station is referred to as which of the following?
A) botnet
B) Trojan
C) logic bomb
D) packet monkey
A) botnet
B) Trojan
C) logic bomb
D) packet monkey
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
________________ events usually track the operations of the firewall or IDPS,making a log entry whenever it starts or shuts down.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Which type of firewall policy calls for a firewall to deny all traffic by default?
A) permissive policy
B) perimeter policy
C) restrictive policy
D) demilitarized policy
A) permissive policy
B) perimeter policy
C) restrictive policy
D) demilitarized policy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An attack in which many computers are hijacked and used to flood the target with so many false requests that the server cannot process them all,and normal traffic is blocked
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
The process of recording which computers are accessing a network and what resources are being accessed,and then recording the information in a log file
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following is NOT information that a packet filter uses to determine whether to block a packet?
A) checksum
B) port
C) IP address
D) protocol
A) checksum
B) port
C) IP address
D) protocol
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A method of authenticating a user using physical information,such as retinal scans,fingerprints,or voiceprints
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
__________________ are spread by several methods,including running executable code,sharing disks or memory sticks,opening e-mail attachments,and viewing infected or malicious Web pages.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
With which access control method do system administrators establish what information users can share?
A) discretionary access control
B) mandatory access control
C) administrative access control
D) role-based access control
A) discretionary access control
B) mandatory access control
C) administrative access control
D) role-based access control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Hardware or software tools that allow or deny packets based on specified criteria,such as port,IP address,or protocol.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Computer files that copy themselves repeatedly and consume disk space or other resources
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
Computer files that copy themselves repeatedly and consume disk space or other resources
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Which security tool works by recognizing signs of a possible attack and sending notification to an administrator?
A) DiD
B) DMZ
C) VPN
D) IDPS
A) DiD
B) DMZ
C) VPN
D) IDPS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An access control method that establishes organizational roles to control access to information
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An access control method that establishes organizational roles to control access to information
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
An area in random access memory (RAM)reserved for the use of a program that "listens" for requests for the service it provides
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
______________________ is the capability to prevent a participant in an electronic transaction from denying that it performed an action.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
______________ do not require user intervention to be launched; they are self-propagating.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
A ______________ is reserved for a program that runs in the background to listen for requests for the service it offers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A semitrusted subnet that lies outside the trusted internal network but is connected to the firewall to make services publicly available while still protecting the internal LAN
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What tool do you use to secure remote access by users who utilize the Internet?
A) VPN
B) IDS
C) DMZ
D) DiD
A) VPN
B) IDS
C) DMZ
D) DiD
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
MATCHING
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A network connection consisting of a port number combined with a computer's IP address
a.auditing
b.biometrics
c.DMZ
d.DDoS attack
e.packet filters
f.port
g.RBAC
h.signatures
i.socket
j.worm
A network connection consisting of a port number combined with a computer's IP address
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What is virus scanning and how does it work?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is a script kiddie?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss permissive versus restrictive firewall policies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Discuss defense in depth.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is malicious port scanning and how can you defend against it?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
List and describe two motivations attackers have to attack a network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Discuss scripting and how it relates to network security.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Compare and contrast virus and worm.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What is social engineering?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
What are the three primary goals of information security? Describe them.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck