Chapter 8 Jeopardy – Flashcards
Unlock all answers in this set
Unlock answersquestion
Botnets often make use of what chat protocol in order to receive commands?
answer
IRC (internet relay chat)
question
Cables types comes in two different modes, single mode and multimode.
answer
fiber optic
question
what characteristic of viruses make it possible for a virus to potentially change its characteristics such as file size, and internal instructions to avoid detection
answer
polymorphism
question
Type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?
answer
noise
question
what software combines known scanning techniques and exploits to allow for hybrid exploits?
answer
Metasploit
question
selecting a punch down block, what block type is more suitable for data connections?
answer
110
question
what is a standard created by the NSA that defines protections against radio frequency emanations?
answer
TEMPEST
question
In ACL statements, the any keyword is equivalent to using which wildcard mask?
answer
255.255.255.255 (/32)
question
what virus combines polymorphism and stealth techniques to create a very destructive virus?
answer
Natas
question
layer that Ethernet exists.
answer
layer 2
question
what mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?
answer
Virtual Wire Mode
question
what two types of agents are used to check compliance with network security policies?
answer
dissolvable agent and persistent agent
question
a reflective attack can be increased in intensity by combining it with what type of attack?
answer
amplification attack
question
at what layer of the OSI model would a TCP or UDP header be added to a payload?
answer
layer 4
question
what feature on some network switches can be used to detect faked arp messages?
answer
Dynamic ARP Inspection
question
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current data?
answer
Logic Bomb
question
what software serves as the firewall for Linux systems?
answer
IPtables
question
At what layer of the OSI model do firewalls operate?
answer
3
question
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what?
answer
Banner-Grabbing Attack
question
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?
answer
Sliding Window
question
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?
answer
Reverse Proxy
question
What TCP field allows the receiving node to determine whether a TCP segment is corrupted during transmission?
answer
Checksum
question
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
answer
Man-in-the-Middle Attack
question
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
answer
Honeynet
question
which two terms can be used to describe a decoy system that is purposely vulnerable for the sake of attracting attackers?
answer
Honeypot & Lure
question
Which two viruses are examples of boot sector viruses?
answer
Michelangelo & Stone
question
What two terms describe a network of compromised computers that are then used to perform coordinated DDoS attacks without their owners' knowledge?
answer
Botnet & Zombie (army)
question
What king of attack involves a flood of broadcast ping messages, with the originating source address being hidden?
answer
smurf attack
question
what two options are IDS implementations used to provide additional security on a network?
answer
HIDS (Host-based Intrusion Detection System) & NIDS
question
The process in which a person attempts to glean access for authentication information by posing as someone who needs that info is known as what?
answer
Phishing
question
A system that is capable of collecting and analyzing info generated by firewalls, IDS, and IPS systems is known as what?
answer
SIEM System (System Info and Event Management)