Filters
Question type

Study Flashcards

One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.


A) block port
B) pan port
C) management port
D) mirror port

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n) ____ is made available.


A) Internet Rights Policy
B) Acceptable Use Policy
C) Internet Abuse Policy
D) Standard Rights Policy

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

B

Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.

Correct Answer

verifed

verified

Match each item with a statement below. -Uses a list of common passwords to try to crack an unknown password


A) Snort
B) Weak password
C) Dictionary attack
D) Brute force
E) Intrusion detection

F) B) and E)
G) None of the above

Correct Answer

verifed

verified

There are only two ways to help prevent a password from being cracked.

A) True
B) False

Correct Answer

verifed

verified

____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.


A) GFI LANguard
B) NetCat
C) L0phtCrack
D) Brutus

E) None of the above
F) All of the above

Correct Answer

verifed

verified

The ____ technique tries all combinations of letters,numbers,and symbols until eventually landing on the correct password.


A) dictionary
B) brute force
C) computed hash
D) linear hash

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.

A) True
B) False

Correct Answer

verifed

verified

Describe the educational,diagnostics,network baseline measurements,and security reasons to capture network traffic.

Correct Answer

verifed

verified

For educational purposes.Taking the time...

View Answer

Capturing packets is also referred to as ____.


A) packet stiffing
B) packet sniffing
C) packet hiding
D) packet blocking

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

B

Describe host-based intrusion detection.

Correct Answer

verifed

verified

In host-based intrusion detection,every computer (host)on the network is responsible for examining its network traffic and recognizing the signatures of different types of intrusions.These may be denial of service attacks,buffer overflow attacks,and malicious code such as worms and scripts.These problems may be discovered and prevented through the use of a software firewall and an anti-virus application.It may,however,be necessary to verify the integrity of a system,as firewalls and anti-virus programs are not perfect.Sometimes the malicious code gets through because it is new and the signatures for its detection are not yet distributed.One way to help detect that a system is not compromised is to examine critical system files for changes.This may be done by creating a secure hash of a set of files and periodically rehashing the files to look for any changes. Host-based intrusion detection may be expensive to implement due to having to purchase firewall,anti-virus,or other protective software for every system on the network.It is also a decentralized approach,since the intrusion detection is being performed on individual systems.This may require a significant amount of time for IT personnel to maintain the systems and respond to individual problems.

Match each item with a statement below. -Examines network traffic for known attack signatures


A) Snort
B) Weak password
C) Dictionary attack
D) Brute force
E) Intrusion detection

F) All of the above
G) D) and E)

Correct Answer

verifed

verified

A list of ports that are in use can be obtained through the ____ utility.


A) NBTSTAT
B) IPCONFIG
C) NETSTAT
D) TCPSTAT

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.

Correct Answer

verifed

verified

A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.


A) false negative
B) true negative
C) true positive
D) false positive

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Match each item with a statement below. -The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature


A) Snort
B) Weak password
C) Dictionary attack
D) Brute force
E) Intrusion detection

F) B) and E)
G) All of the above

Correct Answer

verifed

verified

Security policies and procedures should be static.

A) True
B) False

Correct Answer

verifed

verified

The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.

Correct Answer

verifed

verified

Match each item with a statement below. -Composed of information commonly known about the individual


A) Snort
B) Weak password
C) Dictionary attack
D) Brute force
E) Intrusion detection

F) A) and D)
G) A) and E)

Correct Answer

verifed

verified

A ____ provides the rules and expectations and the consequences of not following the rules.


A) password policy
B) software policy
C) security policy
D) network policy

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 30

Related Exams

Show Answer