Network+ ch 8 – Network Risk Management

29 December 2023
5 (128 reviews)
30 test answers

Unlock all answers in this set

Unlock answers (26)
question
Which software below serves as the firewall for Linux systems?
answer
iptables
question
"If multiple honeypots are connected to form a larger network, what term is used to describe the network?"
answer
honeynet
question
"What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?"
answer
polymorphism
question
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge or consent?
answer
zombie army and botnet
question
What two types of agents are used to check compliance with network security policies?
answer
dissolvable agent, persistent agent
question
A SOHO wireless router typically acts as a firewall and may include packet filtering options.
answer
True
question
"Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?"
answer
worms
question
The term malware is derived from a combination of the words malicious and software.
answer
True
question
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
answer
man-in-the-middle attack
question
Botnets often make use of what chat protocol in order to receive commands?
answer
IRC
question
Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
answer
TEMPEST
question
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
answer
phishing
question
A reflective attack can be increased in intensity by combining it with what type of attack?
answer
amplification attack
question
"What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?"
answer
logic bomb
question
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
answer
Natas
question
"A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?"
answer
SIEM system
question
Which two viruses below are examples of boot sector viruses?
answer
Stoned, Michelangelo
question
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?
answer
metasploit
question
"In ACL statements, the any keyword is equivalent to using which wildcard mask?"
answer
0.0.0.0
question
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?
answer
reverse proxy
question
Which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?
answer
honeypot, lure
question
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?
answer
banner-grabbing attack
question
At what layer of the OSI model do packet filtering firewalls operate?
answer
Network
question
The simplest type of firewall is a content filtering firewall.
answer
False
question
What two options below are IDS implementations used to provide additional security on a network?
answer
NIDS, HIDS
question
Different types of organizations have similar levels of network security risks.
answer
False
question
"What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?"
answer
smurf attack
question
A firewall typically involves a combination of hardware and software.
answer
True
question
What feature on some network switches can be used to detect faked arp messages?
answer
dynamic ARP inspection
question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
answer
virtual wire mode