1.3 Threat Management Flashcards

(57 cards)

1
Q

what is the most secure implementation of file transfer protocol (FTP)?

A

secure file transfer protocol (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the name for a hole in the security of an application deliberately left in place by a designer?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which malicious software infects a system without relying upon other applications for its execution?

A

a worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does an anti-virus application signature file contain?

A

it contains identifying information about viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

which application or services uses TCP/UDP port 3389?

A

remote desktop protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which port number is used by TFTP?

A

UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the name for a fix that addresses a specific windows system problem or set of problems?

A

hotfix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which firewall port should you enable to allow SMTP trafic to flow through the firewall?

A

port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how many TCP/UDP ports are vulnerable to malicious attacks?

A

65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which type of virus can change its signature to avoid detection?

A

polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the default PPTP port?

A

TCP port 1723

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the purpose of NAC?

A

network access control (NAC) ensures that the computer on the network meets an organization’s security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

using role-based access control (RBAC), which entities are assigned roles?

A

users or subjects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the name of the area that connects to a firewall and offers services to untrusted networks?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which virus creates many variants by modifying its code to deceive antivirus scanners?

A

polymorphic virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which port should you block at your network firewall to prevent telnet access?

A

port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a good solution if you need to separate two departments into separate networks?

A

VLAN segregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which port number does LDAP use for communications encrypted using SSL/TLS?

A

port 636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which type of code performs malicious acts only when a certain set of conditions occurs?

A

a logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

which firewall port should you enable to allow IMAP4 traffic to flow through the firewall?

A

TCP port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which two port does FTP use?

A

ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what does VLAN segregation accomplish?

A

it protects each individual segment by isolating the segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

which port number does HTTP use?

24
Q

which port numbers are used by NetBIOS?

A

ports 137, 138, 139

25
which type of malware appears to perform a valuable function, but actually performs malicious acts?
trojan horse
26
which port number does LDAP use when communications are not secured using SSL/TLS?
port 389
27
what does the acronym RBAC denote?
role-based access control
28
which viruses are written in macro language and typically infect operating systems?
macro viruses
29
who can change a resource's category in a mandatory access control environment?
administrators only
30
which port number does NNTP (network news transfer protocol) use?
TCP port 119
31
what is a trojan horse?
malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems
32
which port number does NTP use?
port 123
33
what does the acronym DAC denote?
discretionary access control
34
which firewall port should you enable to allow POP3 traffic to flow through the firewall?
TCP port 110
35
which port number does DHCP use?
port 67
36
which port number is used by SSL, FTPS, and HTTPS?
TCP port 443
37
which port number is used by SSH, SCP, and SFTP?
port 22
38
what is the default L2TP port?
UDP port 1701
39
which type of access control associates roles with each user?
role-based access control (RBAC)
40
why should you install a software firewall and the latest software patches and hotfixes on your computer?
to reduce security risks
41
what is the name for a collection of hotfixes that have been combined into a single patch?
a service pack
42
which type of access control is the multi-level security mechanism used by the department of defense (DoD)?
mandatory access control (MAC)
43
which port number does DNS use?
port 53
44
which port number is used by SMB?
tcp port 445
45
what is a file considered in a mandatory access control environment?
an object
46
what is the purpose of anti-spam application or filters?
to prevent unsolicited e-mail
47
which type of access control was originally developed for military use?
mandatory access control (MAC)
48
when should you install a software patch on a production server?
after the patch has been tested
49
which type of access control is most suitable for top-secret information?
mandatory access control (MAC)
50
which port number does SNMP use?
UDP port 161
51
in a secure network, what should be the default permission position?
implicit deny
52
which port number does SSH use?
port 22
53
which type of virus attempts to hide from antivirus software and from the operating system by remaining in memory?
stealth
54
which port is used for LDAP authentication?
port 389
55
which self-replicating computer program sends copies of itself to other devices on the network?
worm
56
which port number is used by microsoft SQL server?
tcp port 1433
57
which TCP port number does secure sockets layer (SSL) use?
port 443