Network + Ch 8 – Flashcards
Unlock all answers in this set
Unlock answersquestion
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
answer
SIEM system​
question
​Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
answer
​Natas
question
​If multiple honeypots are connected to form a larger network, what term is used to describe the network?
answer
​honeynet
question
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?​
answer
​phishing
question
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
answer
​man-in-the-middle attack
question
​Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
answer
​TEMPEST
question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?​
answer
​virtual wire mode
question
At what layer of the OSI model do firewalls operate?​
answer
Network
question
​What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
answer
​polymorphism
question
Botnets often make use of what chat protocol in order to receive commands?​
answer
​IRC
question
Which software below serves as the firewall for Linux systems?​
answer
​iptables
question
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
answer
​metasploit
question
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​
answer
logic bomb​
question
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?​
answer
​virtual wire mode
question
In ACL statements, the "any" keyword is equivalent to using what wildcard mask below?
answer
0.0.0.0
question
​A reflective attack can be increased in intensity by combining it with what type of attack?
answer
amplification attack
question
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​
answer
banner-grabbing attack
question
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​
answer
worms
question
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​
answer
reverse proxy