1. Which of the following is an application-based attack?
ICMP flood
SYN flood
SQL injection
Distributed reflection denial of service
Question 2.
2. According to the video in Week 1, what are the typical steps used to compromise an organization?
Attack, scanning, footprinting, and enumeration
Footprinting, scanning, enumeration, and attack
Scanning, enumeration, attack, and footprinting
Footprinting, attack, scanning, and enumeration
Question 3.
3. Which network design is usually used to separate and protect private from public network resources?
Hardware and software firewalls
Patch management
DMZ
Stateful packet inspection
Question 4.
4. Three techniques that should be part of every network design include which of the following?
Packet filter, bastion host, circuit level firewalls
DMZs, Proxy servers, NAT
Firestarter, Norton personal firewall, outpost personal firewall
IP spoofing, SYN floods, ping floods
Question 5.
5. Which is not a consideration for which kind of firewall that should be implemented?
Size of network
Need to connect multiple LANs into a single WAN
Skill of administrator
Cost vs. benefit
Question 6.
6. Which firewall solution would be best for a home business, running Windows OS Professional, with minimal confidential data?
Client-Proxy-Destination service
Destination service-Client-Proxy
Proxy-Client-Destination Service
Proxy-Destination Service-Client
Question 7.
7. If an intrusion-detection system detects a series of ICMP packets sent to each port, from the same IP address, it might indicate
distributed denial of service attack in progress.
scanning of the system for vulnerabilities prior to an attack.
the system has been infiltrated by an outsider.
Trojan horse virus infection sending information back home.
Question 8.
8. A fake system that can be used as bait for attackers to attempt to break into is known as
intrusion deflection.
anomaly detection.
executable profiling.
Honeypot.
Question 9.
9. Which of these technologies is a combination of an encryption algorithm and a hash?
Digital signature
RSA
Conventional encryption
PGP
Question 10.
10. Which of the following statements is a weakness of symmetric encryption?
Modern math processors can break it quickly.
It divides data into 64-bit blocks. 64-bit systems are only recently becoming popular.
Because the key must be transmitted, the scheme is only as secure as your transport method.
Throughput is minimal, making it a poor choice for large files. For example, symmetric key encryption has no weaknesses.
Question 11.
11. At what layer of the OSI model does PPTP work?
Layer 1
Layer 2
Layer 3
Layers 2 and 3
Question 12.
12. What does L2TP stand for?
level 2 transfer protocol
layer 2 transfer protocol
layer 2 tunneling protocol
level 2 transfer protocol
Question 13.
13. Which Trojan horse is a small, self-installing remote administration system, which permits a user to control the infected system across a TCP/IP connection?
Back Orifice
Dropper
NetBus
Spybot
Question 14.
14. Which of the following is the most common method by which viruses spread?
By reading the e-mail address book and mailing itself to everyone listed
By broadcasting ICMP packets and following network connections
By accessing the web application and cloning sent mail
By users downloading and installing unauthorized files from the Web
Question 15.
15. Which of the following steps should be taken to lessen hacker threats from Windows default accounts?
Default administrator account should be deleted and the default user account should be given administrator privileges.
Default accounts should be deleted or disabled and a new account should be created with administrative privileges.
Default administrator and user accounts should be deleted.
All default accounts should be deleted or disabled.
Question 16.
16. Which of the following security templates are included in Windows servers?
HIsecdc, Hisecws, Websec, IPSec
DC security Securews, Rootsec, Supersec
Rootsec, Supersec Websec, IPSec
DC security, HIsecdc, Hisecws, Securews
Question 17.
17. Why does the textbook author state that technology alone is not a panacea for network security problems?
Advances in technology occur too rapidly for security pros to keep up with them.
Improvements in technology actually create the most security problems.
Technology cannot be effective if people do not follow appropriate procedures.
The author actually does say that technology solves network security problems.
Question 18.
18. What policy does the textbook author suggest for leaving employees?
Disable all accounts, e-mail, wireless, and cell phones
Tell their new employer about any security issues
Update their Facebook and LinkedIn account status
Have them sign a non-disclosure agreement
Question 19.
19. Which of the following is the first step in assessing a system?
Threat identification
System characterization
Control analysis
Likelihood determination
Question 20.
20. Which of the following is one reason to use a packet sniffer?
Cyber terrorism
Check for attached mass storage devices
Digital forensics of a hard drive
Establishing a baseline of network activity