Filters
Question type

Study Flashcards

What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation?


A) intrusion detection
B) MAC filtering
C) content filter
D) stateful packet inspection

Correct Answer

verifed

verified

Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.


A) rootkit
B) Trojan
C) hoax virus
D) spyware

Correct Answer

verifed

verified

Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?


A) packet storm
B) broadcast flood
C) smurf attack
D) half-open SYN attack

Correct Answer

verifed

verified

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -monopolizes network services or network bandwidth

Correct Answer

verifed

verified

A DoS attack ties up network bandwidth or services, rendering resources useless to legitimate users.

Correct Answer

verifed

verified

Which of the following are true about WPA3? (Choose all that apply.)


A) strongest wireless encryption standard
B) uses TKIP
C) requires PMF
D) backward compatible
E) has only the Enterprise variation

Correct Answer

verifed

verified

If the minimum password length on a Windows system is set to zero, what does that mean?


A) The user never has to change the password.
B) The user can use a blank password.
C) The user has to change the password every day.
D) The user account is disabled.

Correct Answer

verifed

verified

How the network resources are to be used should be clearly defined in a (an) ____________ policy.

Correct Answer

verifed

verified

What is the difference between an IDS and IPS?

Correct Answer

verifed

verified

An intrusion detection system (IDS) moni...

View Answer

What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices?


A) frame
B) EFS
C) tunnel
D) access point

Correct Answer

verifed

verified

Which VPN implementation typically needs no additional firewall configuration to be allowed access through the firewall?


A) SSTP
B) IPSec
C) PPTP
D) L2TP

Correct Answer

verifed

verified

A security policy should clearly state the desired rules, even if they cannot be enforced.

Correct Answer

verifed

verified

Which of the following is a credential category used in multifactor authentication? (Choose all that apply.)


A) authority
B) knowledge
C) rank
D) possession
E) inherence

Correct Answer

verifed

verified

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -packets are denied on context as well as packet properties

Correct Answer

verifed

verified

Why is it important that a network is physically secured?

Correct Answer

verifed

verified

A common guideline in discussing network...

View Answer

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -malware that's activated when a particular event occurs

Correct Answer

verifed

verified

Match each item with a statement below. a.digital certificates b.virus c.denial-of-service d.firewall e.preshared key f.logic bomb g.worm h.stateful packet inspection i.IDS j.backdoor -a series of letters, numbers, and special characters, much like a password, that both communicating devices use to authenticate each other's identity

Correct Answer

verifed

verified

A rootkit is a self-replicating program that masks itself as a useful program but is actually a type of malware.

Correct Answer

verifed

verified

Which protocol works by establishing an association between two communicating devices and can use a preshared key for authentication?


A) EFS
B) Kerberos
C) IPsec
D) SMB

Correct Answer

verifed

verified

What type of policy defines the methods involved when a user sign in to the network?


A) audit
B) security
C) authentication
D) acceptable use

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer