Chapter 03- Practice Questions

7 September 2022
4.7 (114 reviews)
37 test answers

Unlock all answers in this set

Unlock answers (33)
question
How does the CVE standard make network security devices and tools more effective?
answer
they can share information about attack signatures
question
Which of the following is an element of the TCP header that can indicate that a connection has been established?
answer
Flags
question
Which of the following is an accurate set of characteristics you would find in an attack signature?
answer
IP address, TCP flags, port numbers
question
Packet fragmentation is not normal, and can only occur if an attack has been initiated. True/False?
answer
True
question
Newer Trojans listen at a predetermined port on the target computer so that detection is more difficult. True/False?
answer
False
question
crafted packets that are inserted into network traffic
answer
Packet injection
question
lets the other computer know it is finished sending data
answer
FIN packet
question
an undocumented hidden opening through which an attacker can access a computer
answer
back door
question
a set of characteristics that define a type of network activity
answer
Signature
question
used by attackers to delay the progression of a scan
answer
Scan throttling
question
a standard set of communications rules that allows one computer to request a service from another computer
answer
RPC
question
sent when one computer want to stop and restart the connection
answer
RST packet
question
the maximum packet size that can be transmitted
answer
MTU
question
all ports from 0 to 65,535 are probed one after another
answer
vanilla scan
question
a series of ICMP echo request packets in a range of IP addresses
answer
ping sweep
question
A ______________ is made up of IP numbers and options, TCP flags, and port number that define a type of network activity.
answer
Signature
question
Which of the following is the description of a land attack?
answer
source and destination IP address/port are the same
question
What is the term used when an IDPS doesn't recognize that an attack is underway?
answer
false negative
question
A TCP packet with no flags set is referred to as a _________ packet.
answer
Null
question
Which of the following correctly represents the port used by FTP control traffic and FTP file transfer traffic respectively?
answer
21, 20
question
Which of the following is NOT among the items of information that a CVE reference reports?
answer
attack signature
question
In an RPC _________, a targeted host receives an RPC set request from a source IP address of 127.0.0.1.
answer
set spoof
question
Which element of an ICMP header would indicate that the packet is an ICMP echo request message.
answer
Type
question
What is the typical packet sequence for closing a TCP session?
answer
FIN, ACK, FIN ACK, ACK
question
What can an IDPS check to try to determine whether a packet has been tampered with or damaged in transit?
answer
Checksum
question
Under which attack category does a UNIX Sendmail exploitation fall?
answer
suspicious data payload
question
What is the packet called where a Web browser sends a request to the Web server for Web page data?
answer
HTTP GET
question
What is the sequence of packets for a successful threeway handshake?
answer
SYN, SYN ACK, ACK
question
Under which suspicious traffic signature category would a port scan fall?
answer
Reconnaissance
question
Which of the following is NOT a category of suspicious TCP/IP packet?
answer
suspicious CRC value
question
The _______________ part of a packet is the actual data sent from an application on one computer to an application on another.
answer
Payload
question
What type of attack does a remoteaccess Trojan attempt to perpetrate?
answer
back door
question
Which TCP flag can be the default response to a probe on a closed port?
answer
RST
question
The signature of a normal FTP connection includes a threeway handshake. True/False?
answer
True
question
What is signature analysis?
answer
ESSAY
question
What is a multiplepacket attack and what is needed by an IDPS to detect one? Provide an example.
answer
ESSAY
question
Describe the purpose of the CVE and how it works.
answer
ESSAY