Saturday, 21 April 2018

Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:

1. (p. 459) Network components will fail, and you can sum up the best protection against such failure in one word. Select that word from the following:
A. firewalls
B. redundancy
C. DMZ
D. rootkit

2. (p. 459) This term describes several methods for spreading data across multiple drives.
A. inheritance
B. RAID
C. macro
D. honeypot

3. (p. 459) This term describes an unauthorized person who is intentionally trying to access resources on your network.
A. virus
B. authenticated user
C. hacker
D. Trojan

4. (p. 460) Which of the following is the "super" account native to Linux and Macintosh OS X?
A. Administrator
B. Root
C. Admin
D. Supervisor

5. (p. 460) This type of malware replicates through networks.
A. rootkit
B. macro
C. worm
D. Trojan

6. (p. 460) Which of the following is malware that pretends to do one thing, or looks as if it's doing one thing, while doing something evil?
A. rootkit
B. macro
C. worm
D. Trojan
                                                                                  
7. (p. 461) This type of Trojan takes advantage of very low-level operating system functions to hide itself from most less-sophisticated anti-malware tools.
A. rootkit
B. macro
C. worm
D. Trojan

8. (p. 461) While not malware, strictly speaking, this type of program monitors the types of Web sites you frequent and uses that information to create targeted advertisements, often pop-up windows.
A. spyware
B. macro
C. adware
D. Trojan

9. (p. 461) This term describes any program that sends information about you or your computer over the Internet without your consent.
A. spyware
B. macro
C. adware
D. Trojan

10. (p. 463) What is the name for the most recent and more nefarious form of social engineering tactics?
A. Denial of Service
B. phishing
C. smurf attack
D. zombie

11. (p. 464) What type of attack uses zombie computers to bring a network down under a massive number of requests?
A. DDOS
B. phishing
C. smurf attack
D. zombie

12. (p. 464) This term describes a single computer under the control of a (usually) remote operator.
A. DDOS
B. phishing
C. smurf attack
D. zombie

13. (p. 468) Which of the following are alternatives to passwords for authentication? (Select all that apply.)
A. smart devices
B. biometric devices
C. factors
D. inheritance
E. both A and B

14. (p. 468) What is the term that describes an approach that uses tight control over what a user account can do on a network, allowing the user to only do what he or she needs to do for the job, and no more?
A. user account control
B. least privilege
C. group permissions
D. administrative access control

15. (p. 467) Assigning permissions to this type of account makes keeping track of assigned permissions much easier.
A. user
B. group
C. administrator
D. super

16. (p. 469) If a user is a member of more than one group, then the permissions to a single resource assigned to the different groups are combined. What is the term used to describe the resulting permissions.
A. elective
B. combined
C. inheritance
D. effective

17. (p. 470) This term describes how permissions pass down from folder to folder.
A. elective
B. combined
C. inheritance
D. effective

18. (p. 470-471) This is a network's first line of defense against external threats.
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering

19. (p. 471) This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while hiding the actual addresses of internal network hosts.
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering

20. (p. 471) What technique is used to guard against hackers looking for ways to send unauthorized TCP or UDP packets into your network?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering

21. (p. 471-473) These firewall technologies block traffic based on the IP address. (Select all that apply.)
A. packet filtering
B. MAC filtering
C. port filtering
D. IP filtering
E. both A and C

22. (p. 474) What type of filtering is employed when traffic is blocked just based on IP address?
A. stateful
B. port
C. stateless
D. MAC

23. (p. 474) What type of filtering is employed when all packets are examined as a stream, and when a stream is disrupted or packets get corrupted, the firewall acts accordingly?
A. stateful
B. port
C. stateless
D. MAC

24. (p. 474) What firewall technology allows or denies access to a network according to the MAC address of the computer seeking access?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering

25. (p. 475) What is the only network protection provided by Windows Internet Connection Sharing (ICS)?
A. port filtering
B. firewall
C. Network Address Translation (NAT)
D. MAC filtering

26. (p. 477) This is a clever way to lure potential hackers in and log their behavior.
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone

27. (p. 477) You position this lightly protected network between your firewall and the Internet, while your intranet is secure behind the firewall.
A. port filtering
B. honeypot
C. Network Address Translation (NAT)
D. demilitarized zone

28. (p. 468) A clever administrator organizes users into this type of account.
A. user
B. group
C. administrator
D. super

29. (p. 468) What type of device you can insert into a PC in lieu of entering a password?
A. smart
B. biometric
C. factor
D. USB

30. (p. 468) This type of device accepts something of the user, such as a fingerprint, retina scan, or voiceprint in place of a password.
A. smart devices
B. biometric devices
C. factors
D. inheritance

31. (p. 463) Which type of attack involves the attacker inserting him - or herself into a conversation between two others?
A. phishing
B. man in the middle
C. malware
D. leeching

32. (p. 465-466) All of the following are attacks on wireless connections EXCEPT:
A. leeching
B. cracking encryption
C. evil twin
D. FTP bounce

33. (p. 477) Utility programs that can scan a network to determine things like open ports or passive applications are called:
A. viruses
B. Trojans
C. vulnerability scanners
D. firewalls

34. (p. 461) Which of the following is NOT a technique used to deal with malware?
A. anti-malware
B. patch management
C. training
D. wireless encryption

35. (p. 469) Combined permissions that lead to conflicting permissions, where a user does not get access to a needed resource, are usually caused by:
A. deny permissions
B. authentication problems
C. malware
D. identification issues


No comments:

Post a Comment