1. (p. 459) Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:
A. firewalls
B. redundancy
C. DMZ
D. rootkit
A. firewalls
B. redundancy
C. DMZ
D. rootkit
2. (p. 459) This term describes several methods for spreading data across multiple drives.
A. inheritance
B. RAID
C. macro
D. honeypot
A. inheritance
B. RAID
C. macro
D. honeypot
3. (p. 459) This term describes an unauthorized person who is intentionally trying to access resources on your network.
A. virus
B. authenticated user
C. hacker
D. Trojan
A. virus
B. authenticated user
C. hacker
D. Trojan
4. (p. 460) Which of the following is the "super" account native to Linux and Macintosh OS X?
A. Administrator
B. Root
C. Admin
D. Supervisor
A. Administrator
B. Root
C. Admin
D. Supervisor
5. (p. 460) This type of malware replicates through networks.
A. rootkit
B. macro
C. worm
D. Trojan
A. rootkit
B. macro
C. worm
D. Trojan
6. (p. 460) Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?
A. rootkit
B. macro
C. worm
D. Trojan
A. rootkit
B. macro
C. worm
D. Trojan
7. (p. 461) This type of Trojan takes advantage of very low-level operating system functions to hide itself from most less-sophisticated anti-malware tools.
A. rootkit
B. macro
C. worm
D. Trojan
A. rootkit
B. macro
C. worm
D. Trojan
8. (p. 461) While not malware, strictly speaking, this type of program monitors the types of Web sites you frequent and uses that information to create targeted advertisements, often pop-up windows.
A. spyware
B. macro
C. adware
D. Trojan
A. spyware
B. macro
C. adware
D. Trojan
9. (p. 461) This term describes any program that sends information about you or your computer over the Internet without your consent.
A. spyware
B. macro
C. adware
D. Trojan
A. spyware
B. macro
C. adware
D. Trojan
10. (p. 463) What is the name for the most recent and more nefarious form of social engineering tactics?
A. Denial of Service
B. phishing
C. smurf attack
D. zombie
A. Denial of Service
B. phishing
C. smurf attack
D. zombie
11. (p. 464) What type of attack uses zombie computers to bring a network down under a massive number of requests?
A. DDOS
B. phishing
C. smurf attack
D. zombie
A. DDOS
B. phishing
C. smurf attack
D. zombie
12. (p. 464) This term describes a single computer under the control of a (usually) remote operator.
A. DDOS
B. phishing
C. smurf attack
D. zombie
A. DDOS
B. phishing
C. smurf attack
D. zombie
13. (p. 468) Which of the following are alternatives to passwords for authentication? (Select all that apply.)
A. smart devices
B. biometric devices
C. factors
D. inheritance
E. both A and B
A. smart devices
B. biometric devices
C. factors
D. inheritance
E. both A and B
14. (p. 468) What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what he or she needs to do for the job, and no more?
A. user account control
B. least privilege
C. group permissions
D. administrative access control
A. user account control
B. least privilege
C. group permissions
D. administrative access control
15. (p. 467) Assigning permissions to this type of account makes keeping track of assigned permissions much easier.
A. user
B. group
C. administrator
D. super
A. user
B. group
C. administrator
D. super
16. (p. 469) If a user is a member of more than one group, then the permissions to a single resource assigned to the different groups are combined. What is the term used to describe the resulting permissions.
A. elective
B. combined
C. inheritance
D. effective
A. elective
B. combined
C. inheritance
D. effective
17. (p. 470) This term describes how permissions pass down from folder to folder.
A. elective
B. combined
C. inheritance
D. effective
A. elective
B. combined
C. inheritance
D. effective
18. (p. 470-471) This is a network's first line of defense against external threats.
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
19. (p. 471) This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
20. (p. 471) What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
21. (p. 471-473) These firewall technologies block traffic based on the IP address. (Select all that apply.)
A. packet filtering
B. MAC filtering
C. port filtering
D. IP filtering
E. both A and C
A. packet filtering
B. MAC filtering
C. port filtering
D. IP filtering
E. both A and C
22. (p. 474) What type of filtering is employed when traffic is blocked just based on IP address?
A. stateful
B. port
C. stateless
D. MAC
A. stateful
B. port
C. stateless
D. MAC
23. (p. 474) What type of filtering is employed when all packets are examined as a stream, and when a stream is disrupted or packets get corrupted, the firewall acts accordingly?
A. stateful
B. port
C. stateless
D. MAC
A. stateful
B. port
C. stateless
D. MAC
24. (p. 474) What firewall technology allows or denies access to a network according to the MAC address of the computer seeking access?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
25. (p. 475) What is the only network protection provided by Windows Internet Connection Sharing (ICS)?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering
26. (p. 477) This is a clever way to lure potential hackers in and log their behavior.
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone
27. (p. 477) You position this lightly protected network between your firewall and the Internet, while your intranet is secure behind the firewall.
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone
28. (p. 468) A clever administrator organizes users into this type of account.
A. user
B. group
C. administrator
D. super
A. user
B. group
C. administrator
D. super
29. (p. 468) What type of device you can insert into a PC in lieu of entering a password?
A. smart
B. biometric
C. factor
D. USB
A. smart
B. biometric
C. factor
D. USB
30. (p. 468) This type of device accepts something of the user, such as a fingerprint, retina scan, or voiceprint in place of a password.
A. smart devices
B. biometric devices
C. factors
D. inheritance
A. smart devices
B. biometric devices
C. factors
D. inheritance
31. (p. 463) Which type of attack involves the attacker inserting him - or herself into a conversation between two others?
A. phishing
B. man in the middle
C. malware
D. leeching
A. phishing
B. man in the middle
C. malware
D. leeching
32. (p. 465-466) All of the following are attacks on wireless connections EXCEPT:
A. leeching
B. cracking encryption
C. evil twin
D. FTP bounce
A. leeching
B. cracking encryption
C. evil twin
D. FTP bounce
33. (p. 477) Utility programs that can scan a network to determine things like open ports or passive applications are called:
A. viruses
B. Trojans
C. vulnerability scanners
D. firewalls
A. viruses
B. Trojans
C. vulnerability scanners
D. firewalls
34. (p. 461) Which of the following is NOT a technique used to deal with malware?
A. anti-malware
B. patch management
C. training
D. wireless encryption
A. anti-malware
B. patch management
C. training
D. wireless encryption
35. (p. 469) Combined permissions that lead to conflicting permissions, where a user does not get access to a needed resource, are usually caused by:
A. deny permissions
B. authentication problems
C. malware
D. identification issues
A. deny permissions
B. authentication problems
C. malware
D. identification issues
No comments:
Post a Comment