Chapter 8 Quiz Computer Networking Fundamentals

9 September 2022
4.7 (114 reviews)
20 test answers
question
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
answer
a. Data breach b. Security audit c. Exploitation d. *Posture assessment*
question
What wireless attack might a potential hacker execute with a specially configured transmitter?
answer
a. *Jamming* b. Vulnerability c. Evil twin d. Zero-day exploit
question
What kind of vulnerability is exploited by a ping of death?
answer
a. Zero-day exploit b. *Buffer overflow* c. Social engineering d. Backdoor
question
Which type of DoS attack orchestrates an attack using uninfected computers?
answer
a. DDoS (distributed DoS) attack b. Smurf attack c. *DRDoS (distributed reflector DoS) attack* d. PDoS (permanent DoS) attack
question
What software might be installed on a device in order to authenticate it to the network?
answer
a. Operating system b. Security policy c. NAC (network access control) d. *Agent*
question
What feature of Windows Server allows for agentless authentication?
answer
a. *Active Directory* b. ACL (access control list) c. IDS (intrusion detection system) d. Network-based firewall
question
What kind of firewall blocks traffic based on application data contained within the packets?
answer
a. Host-based firewall b. *Content-filtering firewall* c. Packet-filtering firewall d. Stateless firewall
question
What of the following features does not distinguish an NGFW from traditional firewalls?
answer
a. Application Control b. IDS and/or IPS c. User awareness d. *UTM (Unified Threat Management)*
question
At what layer of the OSI model do proxy servers operate?
answer
a. Layer 3 b. Layer 2 c. *Layer 7* d. Layer 4
question
What kind of virus runs in place of the computer's normal system files?
answer
a. Worms b. Macro viruses c. File-infector viruses d. *Boot sector viruses*
question
What unique characteristic of zero-day exploits make them so dangerous?
answer
The vulnerability is exploited before the software developer has the opportunity to provide a solution for it.
question
What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
answer
ARP performs no authentication.
question
A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?
answer
The default password was not changed.
question
Regarding managing security levels, why do network administrators create domain groups?
answer
To simplify the process of granting rights to users
question
What kinds of issues might indicate a misconfigured ACL?
answer
Connectivity and performance issues between two hosts
question
Any traffic that is not explicitly permitted in the ACL is , which is called the .
answer
denied, implicit deny rule
question
What's the difference between an IDS and an IPS?
answer
An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.
question
What causes most firewall failures?
answer
Firewall misconfiguration
question
What are the two primary features that give proxy servers an advantage over NAT?
answer
Content filtering, file caching
question
What distinguishes a virus from other types of malware?
answer
A virus can replicate itself with the intent to infect more computers.
1 of 20

Unlock all answers in this set

Unlock answers (16)
question
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
answer
a. Data breach b. Security audit c. Exploitation d. *Posture assessment*
question
What wireless attack might a potential hacker execute with a specially configured transmitter?
answer
a. *Jamming* b. Vulnerability c. Evil twin d. Zero-day exploit
question
What kind of vulnerability is exploited by a ping of death?
answer
a. Zero-day exploit b. *Buffer overflow* c. Social engineering d. Backdoor
question
Which type of DoS attack orchestrates an attack using uninfected computers?
answer
a. DDoS (distributed DoS) attack b. Smurf attack c. *DRDoS (distributed reflector DoS) attack* d. PDoS (permanent DoS) attack
question
What software might be installed on a device in order to authenticate it to the network?
answer
a. Operating system b. Security policy c. NAC (network access control) d. *Agent*
question
What feature of Windows Server allows for agentless authentication?
answer
a. *Active Directory* b. ACL (access control list) c. IDS (intrusion detection system) d. Network-based firewall
question
What kind of firewall blocks traffic based on application data contained within the packets?
answer
a. Host-based firewall b. *Content-filtering firewall* c. Packet-filtering firewall d. Stateless firewall
question
What of the following features does not distinguish an NGFW from traditional firewalls?
answer
a. Application Control b. IDS and/or IPS c. User awareness d. *UTM (Unified Threat Management)*
question
At what layer of the OSI model do proxy servers operate?
answer
a. Layer 3 b. Layer 2 c. *Layer 7* d. Layer 4
question
What kind of virus runs in place of the computer's normal system files?
answer
a. Worms b. Macro viruses c. File-infector viruses d. *Boot sector viruses*
question
What unique characteristic of zero-day exploits make them so dangerous?
answer
The vulnerability is exploited before the software developer has the opportunity to provide a solution for it.
question
What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
answer
ARP performs no authentication.
question
A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?
answer
The default password was not changed.
question
Regarding managing security levels, why do network administrators create domain groups?
answer
To simplify the process of granting rights to users
question
What kinds of issues might indicate a misconfigured ACL?
answer
Connectivity and performance issues between two hosts
question
Any traffic that is not explicitly permitted in the ACL is , which is called the .
answer
denied, implicit deny rule
question
What's the difference between an IDS and an IPS?
answer
An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.
question
What causes most firewall failures?
answer
Firewall misconfiguration
question
What are the two primary features that give proxy servers an advantage over NAT?
answer
Content filtering, file caching
question
What distinguishes a virus from other types of malware?
answer
A virus can replicate itself with the intent to infect more computers.