Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
answer
a. Data breach
b. Security audit
c. Exploitation
d. *Posture assessment*
question
What wireless attack might a potential hacker execute with a specially configured transmitter?
answer
a. *Jamming*
b. Vulnerability
c. Evil twin
d. Zero-day exploit
question
What kind of vulnerability is exploited by a ping of death?
answer
a. Zero-day exploit
b. *Buffer overflow*
c. Social engineering
d. Backdoor
question
Which type of DoS attack orchestrates an attack using uninfected computers?
answer
a. DDoS (distributed DoS) attack
b. Smurf attack
c. *DRDoS (distributed reflector DoS) attack*
d. PDoS (permanent DoS) attack
question
What software might be installed on a device in order to authenticate it to the network?
answer
a. Operating system
b. Security policy
c. NAC (network access control)
d. *Agent*
question
What feature of Windows Server allows for agentless authentication?
answer
a. *Active Directory*
b. ACL (access control list)
c. IDS (intrusion detection system)
d. Network-based firewall
question
What kind of firewall blocks traffic based on application data contained within the packets?
answer
a. Host-based firewall
b. *Content-filtering firewall*
c. Packet-filtering firewall
d. Stateless firewall
question
What of the following features does not distinguish an NGFW from traditional firewalls?
answer
a. Application Control
b. IDS and/or IPS
c. User awareness
d. *UTM (Unified Threat Management)*
question
At what layer of the OSI model do proxy servers operate?
answer
a. Layer 3
b. Layer 2
c. *Layer 7*
d. Layer 4
question
What kind of virus runs in place of the computer's normal system files?
answer
a. Worms
b. Macro viruses
c. File-infector viruses
d. *Boot sector viruses*
question
What unique characteristic of zero-day exploits make them so dangerous?
answer
The vulnerability is exploited before the software developer has the opportunity to provide a solution for it.
question
What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
answer
ARP performs no authentication.
question
A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
answer
a. Data breach
b. Security audit
c. Exploitation
d. *Posture assessment*
question
What wireless attack might a potential hacker execute with a specially configured transmitter?
answer
a. *Jamming*
b. Vulnerability
c. Evil twin
d. Zero-day exploit
question
What kind of vulnerability is exploited by a ping of death?
answer
a. Zero-day exploit
b. *Buffer overflow*
c. Social engineering
d. Backdoor
question
Which type of DoS attack orchestrates an attack using uninfected computers?
answer
a. DDoS (distributed DoS) attack
b. Smurf attack
c. *DRDoS (distributed reflector DoS) attack*
d. PDoS (permanent DoS) attack
question
What software might be installed on a device in order to authenticate it to the network?
answer
a. Operating system
b. Security policy
c. NAC (network access control)
d. *Agent*
question
What feature of Windows Server allows for agentless authentication?
answer
a. *Active Directory*
b. ACL (access control list)
c. IDS (intrusion detection system)
d. Network-based firewall
question
What kind of firewall blocks traffic based on application data contained within the packets?
answer
a. Host-based firewall
b. *Content-filtering firewall*
c. Packet-filtering firewall
d. Stateless firewall
question
What of the following features does not distinguish an NGFW from traditional firewalls?
answer
a. Application Control
b. IDS and/or IPS
c. User awareness
d. *UTM (Unified Threat Management)*
question
At what layer of the OSI model do proxy servers operate?
answer
a. Layer 3
b. Layer 2
c. *Layer 7*
d. Layer 4
question
What kind of virus runs in place of the computer's normal system files?
answer
a. Worms
b. Macro viruses
c. File-infector viruses
d. *Boot sector viruses*
question
What unique characteristic of zero-day exploits make them so dangerous?
answer
The vulnerability is exploited before the software developer has the opportunity to provide a solution for it.
question
What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
answer
ARP performs no authentication.
question
A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?