Network + Ch 8 RQ – Flashcards

Unlock all answers in this set

Unlock answers
question
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
answer
Posture assessment
question
What wireless attack might a potential hacker execute with a specially configured transmitter?
answer
Jamming
question
what kind of vulnerability is exploited by a ping of deaths?
answer
Buffer overflow
question
Which type DoS attack orchestrates an attack using uninfected computers?
answer
DDroS ( Distributed reflective DoS)
question
What software might be installed on a device in order to authenticate it to the network?
answer
agent
question
What feature of windows server allows for agent-less authentication?
answer
AD (Active Directory)
question
What kind of firewall blocks traffic based on application data contained within the packets?
answer
content-filtering firewall
question
What of the following features does not distinguish an NGFW from traditional firewalls?
answer
NGFW have built-in Application Control features and are application aware, user awareness, context aware. NGFW does not use UTM
question
At what layer of the OSI model do proxy servers operate?
answer
Layer 7, Application Layer
question
What kind of virus runs in place of the computer's normal systems files?
answer
boot-sector viruses
question
What unique characteristic of zero-day exploits make them so dangerous?
answer
because the vulnerability is exploited before the software developer has the opportunity to provide a solution for it
question
What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?
answer
ARP performs no authentication, and so it is highly vulnerable to attacks.
question
A neighbor hacks into your secured wireless network on a regular basis, but you did int give him the password. What loophole was most likely left open?
answer
Default password was never made.
question
Regarding managing security security levels, why do network administrators create domain groups?
answer
to assign rights that meet the needs of those groups.
question
What kinds of issues might indicate a miss-configured ACL?
answer
Wrong people being able to log in.
question
Any traffic that is not explicitly permitted in the ACL is _______, which is called the ______.
answer
dropped, implicit deny
question
What's the difference between an IDS and an IPS?
answer
IDS (intrusion detection system) creates alerts when suspicious activity happens. IPS (intrusion Prevention system) prevents traffic from reaching the network.
question
What causes most firewall failures?
answer
Not being configured correctly
question
What are the two primary features that give proxy servers an advantage over NAT?
answer
Content filtering and improved performance, reverse proxy.
question
What distinguishes a virus from other types of malware?
answer
to be a virus it must replicate itself with the intent to infect more computers.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New