Network+ Chapter 8 – QFT – Flashcards
Unlock all answers in this set
Unlock answersquestion
Posture assessment
answer
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
Data breach
question
Jamming
answer
What wireless attack might a potential hacker execute with a specially configured transmitter?
question
Buffer overflow
answer
What kind of vulnerability is exploited by a ping of death?
question
DRDoS (distributed reflector DoS) attack
answer
Which type of DoS attack orchestrates an attack using uninfected computers?
question
Agent
answer
What software might be installed on a device in order to authenticate it to the network?
question
Active Directory
answer
What feature of Windows Server allows for agentless authentication?
question
Content-filtering firewall
answer
What kind of firewall blocks traffic based on application data contained within the packets?
question
UTM (Unified Threat Management)
answer
What of the following features does not distinguish an NGFW from traditional firewalls?
question
Layer 7
answer
At what layer of the OSI model do proxy servers operate?
question
Boot sector viruses
answer
What kind of virus runs in place of the computer's normal system files?
question
metasploit
answer
Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
question
smurf attack​
answer
What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?​
question
​IRC
answer
Botnets often make use of what chat protocol in order to receive commands?​
question
​Stoned
answer
​Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
question
polymorphism
answer
​What characteristic of viruses make it possible for a virus to potentially change its characteristics (such as file size, and internal instructions) to avoid detection?
question
logic bomb​
answer
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?​
question
worms
answer
Programs that run independently and travel between computers and across networks, such as by e-mail attachment or virtually any kind of file transfer, are known as which option below?​
question
​honeynet
answer
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
question
SIEM system​
answer
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
question
​reverse proxy
answer
A proxy that provides Internet clients access to services on its own network is known as what type of proxy?​
question
Network
answer
At what layer of the OSI model do firewalls operate?​
question
​iptables
answer
Which software below serves as the firewall for Linux systems?​
question
​amplification attack
answer
​A reflective attack can be increased in intensity by combining it with what type of attack?
question
​banner-grabbing attack
answer
An attack in which hackers transmit bogus requests for connection to servers or applications in order to harvest useful information to guide their attack efforts is known as what option below?​
question
​man-in-the-middle attack
answer
An attack that involves a person redirecting or capturing secure transmissions as they occur is known as what type of attack?
question
TEMPEST
answer
​Which option below is a standard created by the NSA that defines protections against radio frequency emanations?
question
phishing
answer
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?​
question
dynamic ARP inspection
answer
What feature on some network switches can be used to detect faked arp messages?
question
0.0.0.0​
answer
​In ACL statements, the any keyword is equivalent to using what wildcard mask below?
question
​virtual wire mode
answer
What mode setting on a firewall makes the firewall transparent to surrounding nodes as if it's just part of the wire?​